An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device. Which mechanism should the engineer configure to accomplish this goal?
acc2326
Highly Voted 4 years, 2 months agojaciro11
Highly Voted 3 years, 8 months agoNonono2
Most Recent 1 year agoMarshpillowz
1 year, 3 months agopsuoh
2 years, 6 months agoRhoads
2 years, 6 months agosis_net_sec
2 years, 11 months agosemi1750
3 years, 2 months agobrownbear505
3 years, 4 months agopsuoh
2 years, 6 months agoMinion2021
3 years, 4 months agodr4gn00t
3 years, 5 months agoneta1o
3 years, 6 months agoVI_Vershinin
4 years agoDinges
4 years agoSirFrates24
4 years agoStardec
3 years, 8 months agoyenp
4 years agoMaleck
4 years agowfexco
4 years, 1 month agostatikd
4 years agoitisfakemaillol
4 years ago