The Using and Managing Security Intelligence document provides information about how to use and manage the Security Intelligence application.
Intended Audience
This information is intended for administrators who have the permission to use and manage the Security Intelligence feature. Users must have familiarity with virtualization technology and network security operations.