configuration
How to run configuration security monitoring scans with Halo
This post was originally published here by leslie devlin. Building off our first configuration security monitoring (CSM) tutorial, today we’re diving into how to run a CSM scan in the Halo interface and examine the results. If you followed the above link, you will notice that our previous explainer video showed you how to clone a […]