Getting Started with USM Appliance

This section details typical security operations performed after the system installation, initial deployment, and configuration of a USM Appliance has been completed. In addition, this section describes a best practice workflow for using USM Appliance to perform operations during the entire Security Monitoring and Management lifecycle.

This section covers the following subtopics: