Capabilities
In this section, you will find:
- A deeper explanation of how each capability works. 
- Configuration options for specific capabilities. 
- Frequently asked questions. 
- Some practical examples. 
If you find a problem, error or if you want to ask related questions, please contact us through our mailing list.
- Log data collection
- File integrity monitoring
- Auditing who-data
- Anomaly and malware detection
- Monitoring security policies
- Monitoring system calls
- Command monitoring
- Active response
- Agentless monitoring
- Anti-flooding mechanism
- Agent labels
- System inventory
- Vulnerability detection
- VirusTotal integration
- Osquery