Note |
---|
Home > Armor Complete - Product User Guide |
Excerpt Include | ||||||
---|---|---|---|---|---|---|
|
Security Dashboards (Home screen)
Use the security dashboards to review and troubleshoot data for your virtual machine
Action Button | ||||
---|---|---|---|---|
|
Security screen
Learn how malware data affects the security status of your virtual machine
Action Button | ||||
---|---|---|---|---|
|
Learn how FIM data affects the security status of your virtual machine
Action Button | ||||
---|---|---|---|---|
|
Learn how the patching status affects the security status of your virtual machine
Action Button | ||||
---|---|---|---|---|
|
Review log statuses and event types and upgrade your log retention plan
Action Button | ||||
---|---|---|---|---|
|
- Overview
- View collected logs
- View logging status of a virtual machine
- Review log retention plans
- Upgrade log retention for existing virtual machines
- Upgrade log retention for new virtual machines
- View log collections projections
- Export log service status
- Troubleshoot Log Source section of the Log Management screen
- Review API calls
Collect host-based logs
Action Button | ||||
---|---|---|---|---|
|
Convert your existing virtual machine into a log collecting device to collect logs from external Linux applications
Action Button | ||||
---|---|---|---|---|
|
Create a remote log source for log collection
Action Button | ||||
---|---|---|---|---|
|
Configure your vulnerability scanning options and schedule a scan for compliance
Action Button | ||||
---|---|---|---|---|
|
Research the reputation of specific IP addresses in order to allow or block
Action Button | ||||
---|---|---|---|---|
|
Create and manage your firewall rules
Action Button | ||||
---|---|---|---|---|
|
Review critical support tickets, known as Security Incidents
Action Button | ||||
---|---|---|---|---|
|
Marketplace screen
View, order, and manage your add-on products
Action Button | ||||
---|---|---|---|---|
|
Infrastructure screen
Create, configure, and maintain your virtual machine
Create, configure, and maintain your virtual machine
Action Button | ||||
---|---|---|---|---|
|
- Review available virtual machines
- Create a virtual machine with a new workload
- Create a virtual machine with an existing workload
- Reboot, reset, suspend, or turn off a virtual machine
- Delete Virtual Machine
- Resize a virtual machine
- Add disk space to an existing virtual machine
- Move a virtual machine to a different workload
- Rename a virtual machine
- Review API calls
Configure your snapshot and retention policy for recovery purposes
Action Button | ||||
---|---|---|---|---|
|
- Overview
- Access the Advanced Backup screen
- Add Advanced Backup for virtual machine restoration
- Restore a virtual machine from a virtual machine snapshot
- Restore a fileset from a virtual machine snapshot
- Add Advanced Backup for fileset restoration
- Restore a fileset from a fileset snapshot
- Edit an existing policy
- Replace an existing policy for a virtual machine
- Delete a policy
- Remove Advanced Backup from a virtual machine
- Troubleshoot Advanced Backup screen
Add or manage your IP addresses
Action Button | ||||
---|---|---|---|---|
|
- Assign a new public IP address to an existing virtual machine
- Assign an existing public IP address to an existing virtual machine
- Unassign and remove an existing public IP address from a virtual machine
- Assign a secondary, available private IP address to an existing virtual machine
- Unassign a secondary private IP address
- Review API calls
Create and manage your L2L VPN tunnels
Action Button | ||||
---|---|---|---|---|
|
Enable SSL VPN access for you and for your users