Setup and use of SCM, SCA, CPM and other endpoint protection products.
For discussion on installation, deployment, setup, configuration, usage, functionality, best practices and troubleshooting of Security Configuration Management content, Security Compliance Analytics component and Endpoint Protection products like Core Protection Module.