Data collection

Arctic Wolf® security services rely on network, endpoint, and cloud-based telemetry sources. The telemetry management pages allow you to:

  • Activate newly installed telemetry appliances.
  • Verify that deployed agents, sensors, scanners, and log collectors are operational.
  • Identify potentially compromised endpoint devices in containment.

To review the status of one or more telemetry sources, see Review the health status of telemetry sources.