Jump to main content
  • Vantage
  • CMC
  • Arc
  • Guardian Air
  • Guardian
  • Remote Collector
  • Threat Intelligence
  • Asset Intelligence
  • Hardware
  1. Home
  2. Arc

    Learn how Arc provides endpoint security in high availability environments.

  3. Arc
  4. Configuration

    Details on how to configure Arc.

  5. Local UI

    The default method to manage Arc is through the parent system software. However, it is also possible to manage Arc through a local UI.

  6. Configuration

    The Configuration page lets you define upstream connection settings, execution options, protection preferences, and traffic monitoring parameters for the Arc sensor.

  • Arc

    Learn how Arc provides endpoint security in high availability environments.

    • Arc
      • Introduction

        An overview of Arc.

      • Requirements

        The machine and network requirements necessary to use Arc.

      • Preparation

        Information on how to import Arc packages, and install a license.

      • Configuration

        Details on how to configure Arc.

        • Configure an Arc sensor in Guardian

          You can configure an individual Arc sensor in Guardian directly from the Sensors details page for the related sensor.

        • Configure an Arc sensor in Vantage

          You can configure an individual Arc sensor in Vantage directly from the Sensors details page for the related sensor.

        • Local UI

          The default method to manage Arc is through the parent system software. However, it is also possible to manage Arc through a local UI.

          • Offline archives

            The Offline archives page shows a list of all the offline archives.

          • Configuration

            The Configuration page lets you define upstream connection settings, execution options, protection preferences, and traffic monitoring parameters for the Arc sensor.

            • Upstream connection

              The Upstream connection page lets you configure and verify the connection between the Arc sensor and the Guardian/Vantage endpoint. Key parameters include the endpoint internet protocol (IP) address and authentication token.

            • Execution options

              The Execution options page lets you configure how Arc collects data, manage detection features, and control network discovery and polling behaviors. You can also set logging levels and adjust specific execution parameters to optimize performance.

            • Threat prevention

              The Threat prevention page lets you tune the feature set aiming to enforce actions directly on the endpoint in order to prevent malware to spread.

            • Traffic monitoring

              The Traffic monitoring page lets you track network traffic using either intermittent or continuous modes. You can configure monitoring parameters, manage resource usage, and choose specific network interfaces to optimize performance.

          • Status

            The Status section shows a list of all the required dependencies for the selected sensor, and the installation status for each dependency.

          • Latest run

            The Latest run section shows the status and mode of the latest run that was executed.

          • Asset inventory

            The Asset inventory section displays the status of Discovery and Smart Polling. These features provide visibility into networked devices and asset details.

          • Last 100 runs

            The Last 100 runs section shows the status of the last 100 runs.

          • Open the local UI

            The local UI lets you manage Arc without the use of a parent system software. It gives you access to the Status page to monitor the status of Arc executions, and the Configuration page to configure Arc executions. You can double-click the executable file to open it, or use the command-line interface (CLI),

        • Shell commands

          A list of available shell commands.

      • Deployment

        Information on how to deploy Arc. This includes details for manual and automatic deployments, and deployment through a mobile device management (MDM) system.

      • Execution

        Information on the different modes that you can use with Arc.

      • Troubleshooting

        Troubleshooting procedures to help you solve problems that might occur when you use Arc.

    • Arc Embedded

      Arc Embedded is a cybersecurity sensor built into PLCs to provide real-time visibility and deep threat detection within industrial control systems.

    • Print format documentation

      A list of all the print-format documentation that is available for Arc and Arc Embedded.

Configuration

The Configuration page lets you define upstream connection settings, execution options, protection preferences, and traffic monitoring parameters for the Arc sensor.

Figure 1. Configuration page

Configuration page showing upstream connection details including sensor ID, endpoint, and token, execution options such as runtime, analysis, detections, and logging, protection settings, and traffic monitoring options with filters and network interfaces

The Configuration page has these sections:

  • Upstream connection
  • Execution options
  • Threat prevention
  • Traffic monitoring
Complete website

Copyright © 2013-, Nozomi Networks Inc.     |     Published: