Linux Secure Shell (SSH) uses remote command execution over the SSH protocol to gather information about the endpoint Linux machine.
Example Use Cases:
Devices with missing or malfunctioning agents, Vulnerable Software
Associated Adapter Resources
Looking for a new adapter?
We currently integrate with over solutions and are continuously adding more. If we don’t integrate with a solution, but should, tell us about it in the form below. You don’t have to be a customer to request an adapter for the Axonius platform!