The "Securely Traversing IACS Data across the IDMZ Using Cisco Firepower Threat Defense Design and Implementation Guide" refers to the use of FMC as the management platform.
Is there any reason why FDM could not be used? I am particularly concerned about whether FDM supports the same application detector capabilities at the FMC application detector capabilities mentioned in Chapter 3.