Up
Previous Next

Sheriff CSMâ„¢

Getting Started with Sheriff CSM

This section details typical security operations performed after the system installation, initial deployment, and configuration of a Sheriff CSM has been completed. In addition, this section describes a best practice workflow for using Sheriff CSM to perform operations during the entire Security Monitoring and Management lifecycle.

This section covers the following subtopics:

This topic: Sheriff > UserGuides > SheriffCSMDocumentation > UserGuide > GettingStartedWithSheriffCSM
Topic revision: 07 Jun 2021, SheriffCyberSecurity
Copyright 2020 Sheriff Cyber Security, LLC. All rights reserved.