Security planning


Administrators use the following information to run  in their environment securely. 

 is divided into two major parts:  in the cloud, and the Remote ETL Engine and related on-premises components that you need to install to collect data from your on-premises environment. For details, see ArchitectureThere are different methods to secure communication with each of these components. For details, see Securing Communication between product components.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*