configuration

How to run configuration security monitoring scans with Halo

This post was originally published here by leslie devlin. Building off our first configuration security monitoring (CSM) tutorial, today we’re diving into how to run a CSM scan in the Halo interface and examine the results. If you followed the above link, you will notice that our previous explainer video showed you how to clone a […]

Share this page