Getting Started with Sheriff CSM
This section details typical security operations performed after the system installation, initial deployment, and configuration of a Sheriff CSM has been completed. In addition, this section describes a best practice workflow for using Sheriff CSM to perform operations during the entire Security Monitoring and Management lifecycle.
This section covers the following subtopics: