An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device. Which mechanism should the engineer configure to accomplish this goal?
acc2326
Highly Voted 3 years, 11 months agojaciro11
Highly Voted 3 years, 5 months agoNonono2
Most Recent 10 months agoMarshpillowz
1 year, 1 month agopsuoh
2 years, 3 months agoRhoads
2 years, 3 months agosis_net_sec
2 years, 9 months agosemi1750
3 years agobrownbear505
3 years, 2 months agopsuoh
2 years, 3 months agoMinion2021
3 years, 2 months agodr4gn00t
3 years, 3 months agoneta1o
3 years, 3 months agoVI_Vershinin
3 years, 9 months agoDinges
3 years, 10 months agoSirFrates24
3 years, 10 months agoStardec
3 years, 6 months agoyenp
3 years, 10 months agoMaleck
3 years, 10 months agowfexco
3 years, 11 months agostatikd
3 years, 10 months agoitisfakemaillol
3 years, 10 months ago