Beyond Getting Started with SEM
Now that you got started using SEM, see the SEM Administrator Guide to learn more about how to configure and set up SEM for your deployment.
For example, you can:
-
Secure your SEM deployment to prevent access from unauthorized users
-
Configure the settings and services to interact with the other systems and services in your IT environment
-
Create rules that respond to security events in real time, whether or not you are monitoring the console
-
Manage the system resources that SEM requires to work properly
-
Collect event data from systems, devices, and applications in your network
-
Manage the monitored nodes running with or without SEM agents
-
Monitor and protect specific systems and devices in your network
You can also access the SEM product forum on THWACK to learn what's new in SEM and learn how other IT professionals are using the product.