Use the following instructions to enable Misconfigurations, Threat Detection, Host Vulnerability Management, and Container Vulnerability Management.

Collecting events using Cloud Security Management will affect your billing. For more information, see Datadog Pricing.
Kubernetes
Docker
ECS EC2
Windows
Linux

PREVIEWING: esther/docs-7422-add-rsyslog-note