Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Current »

Armor can collect logs from third-party sources such as from virtualized appliances, network devices, firewalls, endpoint detection and response tools, switches and others. Users will need to add devices in the Armor Management Portal and then configure their device to communicate with the Armor Agent for collection. 

This section provides information on Log Relay and creating and configuring remote log sources. 

Introduction to Log Relay

Obtain Log Relay for Remote Log Collection

Create and Configure Remote Log Sources

  • No labels