An engineer receives an incident ticket with hundreds of intrusion alerts that require investigation. An analysis of the incident log shows that the alerts are from trusted IP addresses and internal devices. The final incident report stated that these alerts were false positives and that no intrusions were detected. What action should be taken to harden the network?
Bobster02
Highly Voted 3 years, 5 months agoTrainingTeam
Most Recent 6 months, 2 weeks agoDrVoIP
2 years, 2 months agokyle942
2 years, 6 months agoTOLU1985
2 years, 7 months ago