Data collection
Arctic Wolf® security services rely on network, endpoint, and cloud-based telemetry sources. The telemetry management pages allow you to:
- Activate newly installed telemetry appliances.
- Verify that deployed agents, sensors, scanners, and log collectors are operational.
- Identify potentially compromised endpoint devices in containment.
To review the status of one or more telemetry sources, see Review the health status of telemetry sources.