
Table of contents
1 Introduction ............................................................................................................................................................................................... 1
2 Getting started with Security Manager .................................................................................................................................................. 3
Access the Security Manager application ............................................................................................................................. 3
Features of the Security Manager .......................................................................................................................................... 3
Common controls and notications ...................................................................................................................................... 6
What you must provide ........................................................................................................................................................... 7
3 Set up Security Manager .......................................................................................................................................................................... 9
Verify device remediation and hostname resolution ....................................................................................................... 10
Install licenses ........................................................................................................................................................................ 11
Set up Instant On Security .................................................................................................................................................... 13
Congure the email server settings .................................................................................................................................... 16
Set up global credentials ...................................................................................................................................................... 17
4 Use Security Manager ............................................................................................................................................................................ 19
Create a security policy ......................................................................................................................................................... 20
Policies page navigation ................................................................................................................................... 20
Create a policy .................................................................................................................................................... 20
Edit a policy ........................................................................................................................................................ 21
Policy editor icons ......................................................................................................................... 22
Set severity, remediation, and unsupported behavior to policy items in Quick
Settings .......................................................................................................................................... 22
Set policy options for a single item ....................................................................... 23
Set policy options for all the items or for a category ......................................... 24
Export and Import policies ............................................................................................................................... 24
Add and edit device information .......................................................................................................................................... 26
Create a group .................................................................................................................................................... 26
Discover devices ................................................................................................................................................ 27
Add devices using Automatic Discovery .................................................................................... 27
Add devices using Manual Discovery ......................................................................................... 27
ENWW iii
Komentarze do niniejszej Instrukcji