Centralized management

ISAM uses two user interfaces to manage security policies and the ISAM servers.

We can accomplish most tasks using any of these methods.

Parent topic: Core technologies