In this chapter, we first went over installation requirements, adding users, and launching Security Monitor from within VMS. Then we went through the four tab sheets in Security Monitor: Devices, Monitor, Reports, and Admin. Starting with the configuration tasks , we learned how to add and import RDEP, PostOffice, IOS, and PIX devices. Then we went through the Monitor tab sheet and the steps to monitor connections, statistics, and events. We saw how monitoring events through the Security Monitor Event Viewer provides the core function of Security Monitor and how to set up event rules before launching the Event Viewer. The different methods to customize the interface were reviewed. Then we went through Security Monitor's reporting and administration functions, including configuring database rules and setting up user account preferences.