« Previous Tour
Next Tour »
We've added this layer to hold the Theme Press Tour Guide.
changes.mady.by.user Geoff Ka'alani
Saved on Nov 14, 2019
Use the security dashboards to review and troubleshoot data for your instance.
IncidentsReview critical support tickets, known as Security Incidents.
Log ManagementLearn how to view your log statuses, search for collected logs, obtain log relay, and configure your account for remote log collection. Also find documentation on how to review / upgrade your log retention plan, or how to create a remote log source based on your specific log type.
Dynamic Threat BlockingResearch the reputation of specific IP addresses, or create a rule to allow or block an IP address.
Malware ProtectionLearn how malware data affects the security status of your instance. View malware events and detailed Malware Protection data.
File Integrity MonitoringLearn how FIM data affects the security status of your instance.
Intrusion DetectionView data from the host-based intrusion detection system (HIDS).
Vulnerability ScanningView a vulnerability scanning report, or view a parsed version of the weekly vulnerability scanning report.
Create, configure and maintain your instance:
Sync your public cloud account into AMP, such as your Amazon Web Services (AWS) account