Overview

Last updated on:

The Data Source Configuration section allows administrators to configure, manage, and monitor all log sources within their environment for auditing and threat detection. After completing the product setup, this configuration must be performed to include devices, applications, databases, cloud services, and other components. By setting up log sources, you can centralize log collection, improve visibility, and ensure comprehensive monitoring across your enterprise.

This page includes:

This section streamlines log source management and enhanced operational visibility.