Guide to User Documentation for Cisco Security
First Published: Feb 17, 2017
Cisco Security Manager is part of the Cisco Security Management Suite, which delivers comprehensive policy administration and enforcement for the Cisco Self-Defending Network.
This document identifies and links to the various documents available for Cisco Security Manager (Security Manager) and Auto Update Server (AUS) and contains the following sections:
How to Get Started with Security Manager
To set up and get started with Security Manager, we recommend the following:
To learn which applications are available for installation and to plan your installation, see the “Overview” chapter in the Installation Guide for Cisco Security Manager 4.13.
- Get an overview of Cisco Security Manager.
For a general product overview, see the “Product Overview” chapter in the User Guide for Cisco Security Manager 4.13.
Note: For an interactive overview of Security Manager features, see the interactive JumpStart tutorial that opens when you start Security Manager for the first time. You can also access the JumpStart tutorial by choosing Help > JumpStart.
- Review Getting Started checklist.
To get up and running most efficiently, see the “Getting Started with Security Manager” chapter in the User Guide for Cisco Security Manager 4.13.
- Define essential settings.
Use Security Manager to define many application-wide settings that customize your working environment, such as deployment method. See “Completing the Initial Security Manager Configuration” in the User Guide for Cisco Security Manager 4.13.
- Manage user authentication and authorization.
–To define user roles and permissions, see the “Managing User Accounts” chapter in the Installation Guide for Cisco Security Manager 4.13.
–To integrate Security Manager with Cisco Secure ACS, see the “Managing User Accounts” chapter in the Installation Guide for Cisco Security Manager 4.13.
To enable communication between Security Manager and devices, you must configure transport settings on the devices before you add them to the inventory. See the “Preparing Devices for Management” chapter in the User Guide for Cisco Security Manager 4.13.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2017 Cisco Systems, Inc. All rights reserved.