Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Armor can collect logs from third-party sources such as from virtualized appliances, network devices, firewalls, endpoint detection and response tools, switches and others. Users will need to add devices in the Armor Management Portal and then configure their device to communicate with the Armor Agent for collection.

This section provides information on Log Relay and creating and configuring remote log sources.  

_Introduction to Log Relay

_Obtain Log Relay for Remote Log Collection

_Create and Configure Remote Log Sources