« Previous Tour Next Tour »
We've added this layer to hold the Theme Press Tour Guide.
Use the security dashboards to review and troubleshoot data for your virtual machine.
IncidentsReview critical support tickets, known as Security Incidents.
Log ManagementLearn how to view your log statuses, search for collected logs, obtain log relay, and configure your account for remote log collection.
Also find documentation on how to review / upgrade your log retention plan, or how to create a remote log source based on your specific log type.
Dynamic Threat BlockingResearch the reputation of specific IP addresses, or create a rule to allow or block an IP address.
Malware ProtectionLearn how malware data affects the security status of your instance. View malware events and detailed Malware Protection data.
File Integrity Monitoring (FIM)Learn how FIM data affects the security status of your instance.
Vulnerability ScanningView a vulnerability scanning report, or view a parsed version of the weekly vulnerability scanning report.
FirewallLearn how to configure which web traffic can (or cannot) access your virtual machine or server. Also, find documentation on how to create an IP Group or Service Group.
COMPUTEWorkloadsCreate, configure, and maintain your workloads and tiers.
Virtual MachinesCreate, configure, and maintain your virtual machine.
Advanced BackupConfigure your snapshot and retention policy for recovery purposes.
IP AddressesAdd or manage your IP addresses.
LSL VPNCreate and manage your L2L VPN tunnels.
SSL VPNEnable SSL VPN access for you and for your users.
Review the CIS Benchmarks™ that have been adopted by Armor