Capabilities
In this section, you will find:
A deeper explanation of how each capability works.
Configuration options for specific capabilities.
Frequently asked questions.
Some practical examples.
If you find a problem, error or if you want to ask related questions, please contact us through our mailing list.
- Log data collection
- File integrity monitoring
- Auditing who-data
- Anomaly and malware detection
- Security Configuration Assessment
- Monitoring security policies
- Monitoring system calls
- Command monitoring
- Active response
- Agentless monitoring
- Anti-flooding mechanism
- Agent labels
- System inventory
- Vulnerability detection
- VirusTotal integration
- Osquery
- Agent key polling
- Fluentd forwarder