P
ART
5
Monitoring the Security Appliance