Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Note
Home > Armor Complete - Product User Guide

Excerpt Include
Armor Complete users (snippet)
Armor Complete users (snippet)
nopaneltrue


Security Dashboards (Home screen)


Use the security dashboards to review and troubleshoot data for your virtual machine

Action Button
linkHealth Overview Dashboard (Armor Complete)
textHealth Overview Dashboard

Security screen



Learn how FIM data affects the security status of your virtual machine



Learn how the patching status affects the security status of your virtual machine




Collect host-based logs

Action Button
linkCollect host-based logs through Log Relay (Armor Complete)
textLog Relay for host log collection


Convert your existing virtual machine into a log collecting device to collect logs from external Linux applications

Action Button
linkConvert a virtual machine into a log collecting device through Log Relay (Armor Complete)
textLog Relay for log collection



Create a remote log source for log collection 

Action Button
linkCreate a remote log source (Armor Complete)
textCreate a remote log source


Configure your vulnerability scanning options and schedule a scan for compliance 


Research the reputation of specific IP addresses in order to allow or block 




Review critical support tickets, known as Security Incidents

Marketplace screen


View, order, and manage your add-on products

Infrastructure screen