Cargando…

Cisco Security Agent /

Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention System Secure your endpoint systems with host IPS Build and manipulate policies for the systems you wish to protect Learn how to use groups and hosts in the Cisco Security Agent ar...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sullivan, Chad
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : London : Cisco ; Pearson Education [distributor], 2005.
Colección:Cisco Press networking technology series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • pt. 1. need for endpoint security
  • Ch. 1. Introducing endpoint security
  • Ch. 2. Introducing the Cisco Security Agent
  • pt. II. Understanding the CSA building blocks
  • Ch. 3. Understanding CSA groups and hosts
  • Ch. 4. Understanding CSA policies, modules, and rules
  • Ch. 5. Understanding application classes and variables
  • pt. III. CSA agent installation and local agent use
  • Ch. 6. Understanding CSA components and installation
  • Ch. 7. Using the CSA user interface
  • pt. IV. Monitoring and reporting
  • Ch. 8. Monitoring CSA events
  • Ch. 9. Using CSA MC reports
  • pt. V. Analyzing CSA
  • Ch. 10. Application deployment investigation
  • Ch. 11. Application behavior analysis
  • pt. VI. Creating policy, implementing CSA, and maintaining the CSA MC
  • Ch. 12. Creating and tuning policy
  • Ch. 13. Developing a CSA project implementation plan
  • Ch. 14. CSA MC administration and maintenance
  • pt. VII. Appendixes
  • App. A. VMS and CSA MC 4.5 installation
  • App. B. Security monitor integration
  • App. C. CSA MIB.