Table Of Contents
Guide to User Documentation for Cisco Security Manager 4.2
Published: September 6, 2011
Cisco Security Manager is part of the Cisco Security Management Suite, which delivers comprehensive policy administration and enforcement for the Cisco Self-Defending Network. The suite also includes the Cisco Security Monitoring, Analysis, and Response System (MARS), which is available separately.
This document identifies and links to the various documents available for Cisco Security Manager (Security Manager), Auto Update Server (AUS), and Performance Monitor, and contains the following sections:
You can access the Cisco Security Manager documentation set at the following URL:
The documentation set encompasses the following:
The data sheet is a synopsis of Cisco Security Manager features and benefits, including new features.
The release notes contain a product overview and list important notes and known problems.
Installation and Upgrade Guides
These guides contain information for planning your deployment and requirements and procedures for installing Security Manager on a Windows server or in a high availability or disaster recovery configuration. The installation guide provides installation, upgrade, and uninstallation instructions for Security Manager, AUS, and Performance Monitor and includes pre- and post-installation guidelines and troubleshooting information.
Note Please refer to Release Notes for Cisco Security Manager 4.2 for important installation notes.
User Guides and Online Help
Individual user guides and online help for Security Manager, AUS, and Performance Monitor provide conceptual and procedural information.
Tip Context-sensitive online help that contains the content of User Guide for Cisco Security Manager 4.2 is accessible from the Help menu or by clicking Help on any page or dialog box.
The Introduction to the Cisco Security Manager Event Viewer video provides a short introduction to the Event Viewer feature introduced in Cisco Security Manager 4.0.
These documents contain information about specific configuration scenarios and how they are implemented using Cisco Security Manager. Although specific to a particular Security Manager release, configuration examples can be used with other releases that support a feature of interest.
Supported Device Tables
This document contains complete lists of devices and software supported by Security Manager, AUS, and Performance Monitor.
How to Get Started with Security Manager
To get up and running quickly with Security Manager, we recommend the following:
•Plan your installation.
To learn which applications are available for installation and to plan your installation, we recommend that you begin by reviewing the "Overview" chapter of Installation Guide for Cisco Security Manager 4.2 at
•Get an overview of Cisco Security Manager.
For a general product overview, see "Product Overview" in User Guide for Cisco Security Manager 4.2 at
Tip For an interactive overview of Security Manager features, see the interactive JumpStart tutorial that opens when you start Security Manager for the first time. You can also access the JumpStart tutorial by selecting Help > JumpStart.
•Review Getting Started checklist.
To get up and running most efficiently, work through the "Getting Started with Security Manager" chapter of User Guide for Cisco Security Manager 4.2 at
•Define essential settings.
Use Security Manager to define many application-wide settings that customize your working environment, such as deployment method. See "Completing the Initial Security Manager Configuration" in User Guide for Cisco Security Manager 4.2 at
•Manage user authentication and authorization.
–To define user roles and permissions, see the "Managing User Accounts" chapter of Installation Guide for Cisco Security Manager 4.2 at
–To integrate Security Manager with Cisco Secure ACS, see the "Managing User Accounts" chapter of Installation Guide for Cisco Security Manager 4.2 at
•Bootstrap your devices.
To enable communication between Security Manager and devices, you must configure transport settings on the devices before you add them to the inventory. See the "Preparing Devices for Management" chapter in User Guide for Cisco Security Manager 4.2 at
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2011 Cisco Systems, Inc. All rights reserved.