Active Directory, Microsoft 365, and Exchange management and reporting
Hybrid AD, cloud, and file auditing; security; and compliance
Identity security with adaptive MFA, SSPR, and SSO
Reporting, auditing, and monitoring for hybrid Exchange and Skype
Active Directory, Microsoft 365, and Exchange backup and recovery
Hybrid AD, cloud, and file auditing; security; and compliance
SharePoint reporting and auditing
Microsoft 365 security
Cloud security monitoring and analytics
File auditing, data leak prevention, and data risk assessment
File security and storage analysis
Automated patching across multiple OSs and over 850+ third-party apps
Simplified third-party patch deployment via ConfigMgr and Intune
Seamless mobile device management from onboarding to retirement
Remote troubleshooting with integrated chat, voice, and video
Automated OS image creation and seamless role-based deployment
Prioritization-focused enterprise vulnerability management
App control and endpoint privilege management software
Data theft prevention with strict peripheral device control
Browser security with isolation, lockdown, and activity tracking
Sensitive data protection and compliance for endpoint devices
Real-time ransomware mitigation and file recovery for business continuity
Full-stack observability with AIOps and digital experience monitoring
AI-powered, all-in-one SaaS platform for observability and digital experience monitoring
Digital experience, application performance, and infrastructure monitoring
All-in-one vendor risk assessment tool to ensure domain security
Network, server, and storage performance monitoring
Bandwidth monitoring and traffic analysis
Network change and configuration management
Firewall rule, configuration, and log management
IP address and switch port management
Centralized IT alert management
Status pages for real-time status and incident communication
A cloud-native identity platform for workforce IAM
Full-stack service management for enterprises
IT asset management with an integrated CMDB
Unified endpoint management and security
Comprehensive mobile device management
Enterprise remote access
Automated multi-OS patch management
Full-stack monitoring for IT admins, DevOps, and SREs
Status pages for real-time status and incident communication
Cloud cost management for modern software teams
SaaS management platform to maximize ROI
Centralized IT alert management
Secure your IT infrastructure and prove compliance from the cloud
AI-powered unified analytics platform to correlate all IT data
An all-in-one DNS management service to keep your business online
Low-code application development platform
Remote support software
Collaborative project management
Agile project management
All-in-one collaboration tool for unified communication
Secure email hosting solution for businesses
All-in-one video conferencing solution for remote business meetings
All-in-one AR remote assistance software solution for remote collaboration.
Unified network monitoring and endpoint management for MSPs
Unified Active Directory management and reporting solution for MSPs
Unified SIEM solution for MSSPs
Log management and advanced threat intelligence for MSSPs
Complete privileged access security for enterprises
Privileged password management
Full-stack service management for MSPs
Amazon Elastic Container Registry (Amazon ECR) is a secure, scalable, and reliable AWS-managed container image registry service. Amazon ECR supports private repositories with resource-based permissions using AWS IAM, allowing specified users or Amazon EC2 instances to access your container repositories and images. With Applications Manager's Elastic Container Registry monitoring tool, you can enhance the performance, security, and efficiency of your container image repositories, ensuring smooth application deployment and management.
To learn how to create a new AWS Elastic Container Registry monitor, refer here.
Go to the Monitors Category View by clicking the Monitors tab. Click on the Elastic Container Registry instance available under Amazon in the Cloud Apps section. Displayed is the Amazon Elastic Container Registry bulk configuration view distributed into three tabs:
By clicking a monitor from the list, you'll be taken to the AWS Elastic Container Registry dashboard which includes the following tabs:
Parameter | Description |
---|---|
IMAGE PULL REQUESTS | |
Image Pull Request Rate | The total number of image pulls per minute from the repository between the poll interval (in pulls/min). |
Image Pull Requests | The total number of pulls for the images from the repository between the poll interval. |
Image Details | |
Image Digest | The sha256 digest of the image manifest. |
Image Size | The size of the image (in MB). |
Image Age | The number of days since the image was pushed to the repository (in days). |
Scan Status | The current state of an image scan. |
Reason | The reason for the image scan status. |
Scan Completion Time | The timestamp of the last completed image scan. |
Last Pull Time | The last time the image was pulled (Amazon ECR refreshes the last image pull timestamp at least once every 24 hours). |
Image Scan Details | |
Image Digest | The sha256 digest of the image manifest. |
Last Vulnerability Scan Time | The time when the vulnerability source was last updated. |
Critical Severity | The count of critical severity findings. |
High Severity | The count of high severity findings. |
Medium Severity | The count of medium severity findings. |
Informational Severity | The count of informational severity findings. |
Low Severity | The count of low severity findings. |
Undefined Severity | The count of undefined severity findings. |
Parameter | Description |
---|---|
CONFIGURATION | |
Registry ID | The ID of the registry. |
Repository ARN | The ARN of the repository. |
Repository URI | The URI of the repository. |
Scan On Push | Indicates if image scanning is enabled on push. |
Image Tag Mutability | Specifies whether image tags are mutable. |
Encryption Type | The type of encryption used for the repository. |
Creation Time | The time when the repository was created. |