In This Section
Step 1: Identify important devices
Step 2: Ensure monitors are configured for important devices
Step 3: Configure alerts for important devices
Step 4: Configure action policies