Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 563 Next »

CIS Benchmarks


Review the CIS Benchmarks™ that have been adopted by Armor



Infrastructure




COMPUTE

Workloads
Create, configure, and maintain your workloads and tiers.

Virtual Machines
Create, configure, and maintain your virtual machine.

Advanced Backup
Configure your snapshot and retention policy for recovery purposes.

NETWORK


IP Addresses
Add or manage your IP addresses.

L2L VPN
Create and manage your L2L VPN tunnels.

SSL VPN
Enable SSL VPN access for you and for your users.

Security


DASHBOARDS

Use the security dashboards to review and troubleshoot data for your virtual machine.



ARMOR SERVICES

Incidents
Review critical support tickets, known as Security Incidents.

Log Management

Learn how to collect logs from the security capabilities within the agent as well as from cloud native and third-party log sources.

Also, find documentation on how to review / upgrade your log retention plan, or how to configure and create a remote log source, based on your specific log type.

IP Threat Lookup
Research the reputation of specific IP addresses, or create a rule to allow or block an IP address.


Malware Protection
Learn how to view malware events, and how malware data affects the security status of your instance.

File Integrity Monitoring (FIM)
Learn how FIM data affects the security status of your instance.

Vulnerability Scanning
View a vulnerability scanning report, or view a parsed version of the weekly vulnerability scanning report.

Firewall
Learn how to configure which web traffic can (or cannot) access your virtual machine or server. Also, find documentation on how to create an IP Group or Service Group.

  • No labels