These guides contain information for planning your deployment and requirements and procedures for installing Security Manager on a Windows server or in a high availability or disaster recovery configuration. The installation guide provides installation, upgrade, and uninstallation instructions for Security Manager and AUS and includes pre- and post-installation guidelines and troubleshooting information.
These documents contain information about specific configuration scenarios and how they are implemented using Cisco Security Manager. Although specific to a particular Security Manager release, configuration examples can be used with other releases that support a feature of interest.
Note: For an interactive overview of Security Manager features, see the interactive JumpStart tutorial that opens when you start Security Manager for the first time. You can also access the JumpStart tutorial by selecting Help > JumpStart.
Use Security Manager to define many application-wide settings that customize your working environment, such as deployment method. See “Completing the Initial Security Manager Configuration” in the User Guide for Cisco Security Manager 4.12.
To enable communication between Security Manager and devices, you must configure transport settings on the devices before you add them to the inventory. See the “Preparing Devices for Management” chapter in the User Guide for Cisco Security Manager 4.12.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.