Use the security dashboards to review and troubleshoot data for your virtual machine.
IncidentsReview critical support tickets, known as Security Incidents.
Learn how to view your log statuses, search for collected logs, and obtain log relay.
Also, find documentation on how to review / upgrade your log retention plan, or how to configure and create a remote log source, based on your specific log type.
Dynamic Threat BlockingResearch the reputation of specific IP addresses, or create a rule to allow or block an IP address.
Malware ProtectionLearn how to view malware events, and how malware data affects the security status of your instance.
File Integrity Monitoring (FIM)Learn how FIM data affects the security status of your instance.
Vulnerability ScanningView a vulnerability scanning report, or view a parsed version of the weekly vulnerability scanning report.
FirewallLearn how to configure which web traffic can (or cannot) access your virtual machine or server. Also, find documentation on how to create an IP Group or Service Group.
COMPUTEWorkloadsCreate, configure, and maintain your workloads and tiers.
Virtual MachinesCreate, configure, and maintain your virtual machine.
Advanced BackupConfigure your snapshot and retention policy for recovery purposes.
IP AddressesAdd or manage your IP addresses.
L2L VPNCreate and manage your L2L VPN tunnels.
SSL VPNEnable SSL VPN access for you and for your users.
Review the CIS Benchmarks™ that have been adopted by Armor