Security Guide Session Monitor Security Overview Recommended Deployment Configurations Recommended Deployment Configurations Figure 1-2 shows a typical Session Monitor system deployment. Figure 1-2 Typical Session Monitor System