A Security Administrator is performing a log analysis as a result of a suspected AWS account compromise. The Administrator wants to analyze suspicious AWS
CloudTrail log files but is overwhelmed by the volume of audit logs being generated.
What approach enables the Administrator to search through the logs MOST efficiently?
INASR
Highly Voted 3 years, 11 months agohozefa
Highly Voted 3 years, 10 months agoGeeBeeEl
3 years, 9 months agoskipbaylessfor3
3 years, 9 months agobalsdo
Most Recent 1 month, 2 weeks agoMajoko
1 year, 4 months agoRaphaello
1 year, 5 months agoITGURU51
2 years, 3 months agoSaucyVip3r
2 years, 3 months agomatrpro
2 years, 3 months agoluis12345
2 years, 7 months agojanvandermerwer
2 years, 9 months agoarae
2 years, 10 months ago123Raj333
2 years, 11 months agodcasabona
3 years agoteo2157
3 years, 4 months agoNSF2
3 years, 6 months agouninit
3 years, 7 months agoHananS
3 years, 3 months agoIMAHM
3 years, 9 months ago