Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Armor can collect logs from third-party sources such as from virtualized appliances, network devices, firewalls, endpoint detection and response tools, switches and others. Users will need to add devices in the Armor Management Portal and then configure their device to communicate with the Armor Agent for collection.

This section provides information on Log Relay and creating and configuring remote log sources.

Introduction to Log Relay

Obtain Log Relay for Remote Log Collection

Create and Configure Remote Log Sources