Learn how to collect logs from the security capabilities within the agent as well as from cloud native and third-party log sources.
Also, find documentation on how to review / upgrade your log retention plan, or how to configure and create a remote log source, based on your specific log type.
IP Threat Lookup Research the reputation of specific IP addresses, or create a rule to allow or block an IP address.
Malware Protection Learn how to view malware events, and how malware data affects the security status of your instance.