Clustering Algorithm (Input to Clustering)
Advanced users can choose the main source of data for clustering algorithms, that is, live network flows, or running processes, or both.
This is a placeholder for Help text related to using the Security Help Center seach feature.
Log In to the Cisco Security Documentation Portal
Manage Policy Lifecycle in Secure Workload Create and Discover Policies Discover Policies Automatically Advanced Features of Automatic Policy Discovery Advanced Configurations for Automatic Policy Discovery Clustering Algorithm (Input to Clustering)
Last updated: Jun 09, 2025
Advanced users can choose the main source of data for clustering algorithms, that is, live network flows, or running processes, or both.