O'Reilly logo

Security Threat Mitigation and Response: Understanding Cisco Security MARS by Greg Abelar, Dale Tesch

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Reporting and Mitigative Device Configuration

<feature><title></title>

In this chapter, you learn how to configure your network and security devices to send information to the CS-MARS platform. Topics covered in this chapter include the following:

</feature>

In this chapter, you learn how to configure your security and network devices, operating systems, and database servers to send events and syslog data to your CS-MARS appliance. This includes the configurations of routers, switches, firewalls, intrusion-prevention systems (IPS), operating systems, web server applications, Virtual Private Network (VPN) concentrators, generic devices, and database servers. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required