# Host (Pulsar-Agent)

## What is a host at Enginsight?

In the Enginsight platform, a host is a server or client on which the Pulsar agent has been installed in order to monitor it from the inside. The Pulsar agent runs platform-independently on Windows, Linux and MacOS (see: [Unterstützte Betriebssysteme](https://docs.enginsight.com/docs/technische-details/systemanforderungen/unterstuetzte-betriebssysteme)).

## Inhaltsübersicht <a href="#inhaltsubersicht" id="inhaltsubersicht"></a>

* [Pulsar-Agent](https://docs.enginsight.com/docs/bedienung/plattform/hosts-agent-pulsar/pulsar-agent) \
  [Install](https://docs.enginsight.com/docs/master/operation/platform/pulsar-agent#installation-creating-a-new-host) the Pulsar agent (e.g. via [Windows Group Policy ](https://docs.enginsight.com/docs/master/operation/platform/pulsar-agent#roll-out-pulsar-agent-via-windows-group-policy)and in a [VDI environment](https://docs.enginsight.com/docs/master/operation/platform/pulsar-agent#install-pulsar-agent-in-vdi-environments)), configure and [uninstall](https://docs.enginsight.com/docs/master/operation/platform/pulsar-agent#manual-uninstallation) it.
* [Hostdetails](https://docs.enginsight.com/docs/bedienung/plattform/hosts-agent-pulsar/hostdetails) \
  Information and configurations of individual hosts: including [monitoring](https://docs.enginsight.com/docs/master/operation/platform/hostdetails#monitoring), [vulnerability management](https://docs.enginsight.com/docs/master/operation/platform/hostdetails#schwachstellenmanagement), [compliance](https://docs.enginsight.com/docs/master/operation/platform/hostdetails#compliance), [intrusion detection system](https://docs.enginsight.com/docs/master/operation/platform/hostdetails#intrusion-detection-system), [file integrity monitoring](https://docs.enginsight.com/docs/master/operation/platform/hostdetails#file-integrity-monitoring) and [advanced persistent threats](https://docs.enginsight.com/docs/master/operation/platform/hostdetails#advanced-persistent-threats).
* [Softwareinventar](https://docs.enginsight.com/docs/bedienung/plattform/host-pulsar-agent-beta/softwareinventar) \
  Inventory of installed software on all hosts
* [Policies](https://docs.enginsight.com/docs/bedienung/plattform/host-pulsar-agent-beta/policies) \
  Manage Enginsight settings via tags on multiple hosts together.
* [Plugins](https://docs.enginsight.com/docs/bedienung/plattform/host-pulsar-agent-beta/plugins) \
  Execute scripts automatically: [Create plugins](https://docs.enginsight.com/docs/master/operation/platform/plugins#create-plugins) and execute them regularly or in [response to system events](https://docs.enginsight.com/docs/master/operation/platform/plugins#autonomous-reaction-to-system-event-via-alerting).
* [Tags](https://docs.enginsight.com/docs/bedienung/plattform/tags)
* [Tag Manager](https://docs.enginsight.com/docs/bedienung/plattform/host-pulsar-agent-beta/tag-manager)
* [Update Manager](https://docs.enginsight.com/docs/bedienung/plattform/host-pulsar-agent-beta/schwachstellen-manager) \
  Listing of pending updates on all hosts and importing updates together on several hosts.
* [Compliance](https://docs.enginsight.com/docs/bedienung/plattform/host-pulsar-agent-beta/compliance)
* [Intrusion Detection System](https://docs.enginsight.com/docs/bedienung/plattform/host-pulsar-agent-beta/intrusion-detection-system) \
  Analyze network traffic for cyberattacks: [Configure IDS](https://docs.enginsight.com/docs/master/operation/platform/intrusion-detection-system#configure-ids), [investigate network anomalies](https://docs.enginsight.com/docs/master/operation/platform/intrusion-detection-system#network-anomalies), manage [whitelist](https://docs.enginsight.com/docs/master/operation/platform/intrusion-detection-system#whitelist).
* [File Integrity Monitoring](https://docs.enginsight.com/docs/bedienung/plattform/host-pulsar-agent-beta/file-integrity-monitoring) \
  Monitoring the integrity of your data and systems with the [FIM dashboard](https://docs.enginsight.com/docs/master/operation/platform/file-integrity-monitoring#dashboard), creation of [rules](https://docs.enginsight.com/docs/master/operation/platform/file-integrity-monitoring#rules) and overview of relevant logs.
* [Advanced Persistent Threats](https://docs.enginsight.com/docs/bedienung/plattform/host-pulsar-agent-beta/advanced-persistent-threats)
