Review critical support tickets, known as Security Incidents.
Learn how to collect logs from the security capabilities within the agent as well as from cloud native and third-party log sources.
Also, find documentation on how to review / upgrade your log retention plan, or how to configure and create a remote log source, based on your specific log type.
IP Threat Lookup
Research the reputation of specific IP addresses, or create a rule to allow or block an IP address.
Learn how to view malware events, and how malware data affects the security status of your instance.
File Integrity Monitoring (FIM)
Learn how FIM data affects the security status of your instance.
View a vulnerability scanning report, or view a parsed version of the weekly vulnerability scanning report.
Learn how to configure which web traffic can (or cannot) access your virtual machine or server. Also, find documentation on how to create an IP Group or Service Group.