< Day Day Up > |
Understanding, interpreting, and using the event log database efficiently directly affects how successful your CSA deployment will be. For day-to-day post-installation monitoring of CSA, refer to the various views available below Events on the main navigation menu to find the information required. Another important topic covered in this chapter is alerting, which speeds in the remediation of security events affecting your architecture by alerting via other management tools and informing the necessary individuals as soon as possible. In the coming chapters, you begin to use the information within the database to assist in tuning the product for an effective, unintrusive, and highly secure deployment. |
< Day Day Up > |