Up
Previous Next

Sheriff CSMâ„¢

Getting Started with Sheriff CSM

This section details typical security operations performed after the system installation, initial deployment, and configuration of a Sheriff CSM has been completed. In addition, this section describes a best practice workflow for using Sheriff CSM to perform operations during the entire Security Monitoring and Management lifecycle.

This section covers the following subtopics:

Topic revision: r6 - 07 Jun 2021, SheriffCyberSecurity
Copyright 2020 Sheriff Cyber Security, LLC. All rights reserved.