Start off with the canned reports that come with the LEM software and you will have addressed almost all of the low hanging fruit. But as I said in another post re: LEM, define your scope! Are you looking at systems? Network? Applications? Threat detection? All or some of the above? Define your scope and then chart your course with LEM.
↧