Capabilities
In this section, you will find:
a deeper explanation of how each capability works,
configuration options for specific capabilities,
frequently asked questions, and
some practical examples.
If you find a problem, error or if you want to ask related questions, please contact us through our mailing list.
- Log data collection
- File integrity monitoring
- Auditing who-data
- Anomaly and malware detection
- Monitoring security policies
- Monitoring system calls
- Command monitoring
- Active response
- Agentless monitoring
- Anti-flooding mechanism
- Agent labels
- Vulnerability detection
- VirusTotal integration
- Vuls integration (Deprecated)