ISCS version 0.1.1
Please do not attempt to get started before reading A Short Introduction to ISCS. If you approach ISCS like other network security configuration tools you have used, this Getting Started section will appear very confusing. When you understand the ISCS way, you will see how easy and how powerful network security management with ISCS is.
The first step after starting the SPM is to login:
There are five foundational activities to getting started with ISCS:
Define Accessors and Access Groups
Define Resources and Resource Groups