This chapter describes how to configure the System Management Agent for use within
your network. This chapter covers the configuration files and security features of the System
Management Agent. This chapter contains material on the following topics: