A security analyst is investigating a workstation that is suspected of outbound communication to a command-and-control server. During the investigation, the analyst discovered that logs on the endpoint were deleted. Which of the following logs would the analyst most likely look at next?
Kingamj
Highly Voted 1 year agoGlacier88
Most Recent 11 months, 3 weeks ago1edea48
1 year ago850bc48
11 months ago3dk1
9 months, 2 weeks agoa4e15bd
1 year ago