Command Module
Command collects telemetry and produces proof you can defend: Field Coverage verdicts, encrypted config evidence snapshots with hashes, and governed remediation actions with approvals.
High-throughput telemetry with defensible evidence.
How It Works
01
Syslog, NetFlow v9, and IPFIX ingestion
Syslog, NetFlow v9, and IPFIX ingestion with normalization
02
Collectors with spooling
Collectors with spooling, backpressure, and retries
03
RBAC-enforced evidence and audit logs for
RBAC-enforced evidence and audit logs for governed actions
At a Glance
Used For
CMMC • SOC 2
Outcomes
Prove telemetry integration correctness • Detect drift and misconfiguration • Produce technical evidence for auditors
Exports & Records
Coverage verdict report • Config snapshot hashes • Job logs
Technical Notes
Syslog, NetFlow v9, and IPFIX ingestion with normalization • Collectors with spooling, backpressure, and retries • RBAC-enforced evidence and audit logs for governed actions
Sharing and Controls
Pair outputs with Trust Center tiers so you control what’s shared and preserve access logs.
Artifacts reviewers recognize, plus sample previews of structure.
Works with your security stack
FAQ
Want a walkthrough focused on this feature?
Bring a reviewer request. We'll map the workflow end-to-end.
No obligation. We respond within one business day. No compliance guarantees.