A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?
metzen227
Highly Voted 12 months agoe5c1bb5
Highly Voted 12 months agoslackbot
Most Recent 1 month, 2 weeks agojustin_es6
8 months, 2 weeks agodbrowndiver
9 months, 1 week agoSHADTECH123
11 months, 3 weeks agoshady23
12 months agoe5c1bb5
12 months ago