Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Topics Discussed

...

Column

Description

Name

This column displays the name of your virtual machine.

Source IP

This column displays the IP address of the signature.

Source Port

This column displays the port address of the signature.

Destination IP

This column displays the IP address of your virtual machine.

Destination Port

This column displays the port address of your virtual machine.

Event Signature

This column displays the the content of the signature.

Event Timestamp

This column displays the time and date when the event signature was detected.

Count

This column displays the number of event signatures that were detected.

Anchor
Enable-Trend-Sub-Agent
Enable-Trend-Sub-Agent
Enable Trend Sub-Agent

...

Info

You can also manage the Trend sub-agent in the Armor Toolbox.


Recommendation Scans

...

One of the features available in Agent 3.0 is Recommendation scans. Recommendation scans provide a good starting point for establishing a list of rules that you should implement. During a recommendation scan, the Armor Agent scans the operating system for installed applications, the Windows registry, open ports, and more. To take advantage of Recommendation scans, turn on Ongoing Recommendation scans in the Toolbox.

Info

Recommendation Scans work in tandem with the Auto-Apply configuration for IPS. The results of the Recommendation Scan can only be applied when Auto-Apply for the IPS service is turned on.

...

Code Block
Windows: C:\.armor\opt\armor.exe ips help
Linux: /opt/armor/armor ips help


Export IDS Data

...

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Security.

  2. Click Intrusion Detection.

  3. (Optional) Use the filter function to customize the data displayed.

  4. Below the table, click CSV.

    • You have the option to export all of the data (All), or only the data that appears on the current screen (Current Set).

Anchor
Log-Search-for-Intrusion-Detection
Log-Search-for-Intrusion-Detection
Log Search For Intrusion Detection

...