Download page Getting Started with Cisco Secure Application.
Getting Started with Cisco Secure Application
This page provides a step-by-step procedure on how to get started with Cisco Secure Application.
Step 1: Ensure:
Check the required version of the Controller and APM Agent.
Cisco Secure Application is supported on a SaaS Controller only.
Install the .NET Agent for Linux
Cisco Secure Application Requirements
|Step 2: Obtain the Cisco Secure Application license.||Contact the AppDynamics sales representative or email email@example.com.|
Step 3: Assign roles using the AppDynamics Administration Console.
Assign the Configure Cisco Secure Application account permission to the users who are required to modify configurable fields on the Cisco Secure Application dashboard.
Assign View Cisco Secure Application account permissions to users who are required to only monitor the dashboard.
|Step 4: Click the Security Events widget on an application flowmap.|
Launch the required AppDynamics Application dashboard using your account, and then click Security Events on the right pane.
This redirects you to the Cisco Secure Application dashboard.
|Monitor Application Security Using Cisco Secure Application|
Step 5: From the Cisco Secure Application Dashboard navigate to the Applications page, and then set Security Setting as Enabled for the target application.
This is applicable for all users with Configure permission for Cisco Secure Application.
|The Security Setting value is set to Inherit by default for all applications that inherit the non-configurable tenant setting of Disabled. To enable security for an application, you must set Security Setting to Enabled.||Monitor Security Status of Applications|
|Step 6: From the Applications page, verify that the application nodes are registered and active.||From the Applications page, check the Active Nodes and Registered Nodes fields for the specific application. Ensure that the application nodes are active. If the nodes are not active, then the application security data is not displayed on the dashboard.||Monitor Security Status of Applications|
|Step 7: From the Libraries page view the risk-sorted libraries of secured applications.||The Libraries page displays all the existing libraries of application(s) based on the selected application scope. You can use the risk score to prioritize the remediation task.||Monitor Libraries|
Based on your analysis from the dashboard you can create or modify policies and then view the different pages on the dashboard to monitor the security of APM-managed applications. See Cisco Secure Application Policies.