A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?
metzen227
Highly Voted 1 year, 1 month agoe5c1bb5
Highly Voted 1 year, 1 month agoleonbre
Most Recent 3 weeks, 5 days agoslackbot
3 months agojustin_es6
10 months, 1 week agodbrowndiver
11 months agoSHADTECH123
1 year, 1 month agoshady23
1 year, 1 month agoe5c1bb5
1 year, 1 month ago