Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Note
Home > Armor Complete - Product User Guide

Excerpt Include
Armor Complete users (snippet)
Armor Complete users (snippet)
nopaneltrue


Security Dashboards (Home screen)


Use the security dashboards to review and troubleshoot data for your virtual machine

Image Removed



Security screen



Learn how FIM data affects the security status of your virtual machine



Learn how the patching status affects the security status of your virtual machine




Collect host-based logs

Action Button
linkCollect host-based logs through Log Relay (Armor Complete)
textLog Relay for host log collection


Convert your existing virtual machine into a log collecting device to collect logs from external Linux applications

Action Button
linkConvert a virtual machine into a log collecting device through Log Relay (Armor Complete)
textLog Relay for log collection


Create a remote log source for log collection

Action Button
linkCreate a remote log source (Armor Complete)
textRemote Log Collection


Configure your vulnerability scanning options and schedule a scan for compliance 


Research the reputation of specific IP addresses in order to allow or block 




Review critical support tickets, known as Security Incidents

Image Removed



Infrastructure screen







Image Removed