A security analyst is investigating a workstation that is suspected of outbound communication to a command-and-control server. During the investigation, the analyst discovered that logs on the endpoint were deleted. Which of the following logs would the analyst most likely look at next?
Kingamj
Highly Voted 10 months, 2 weeks agoGlacier88
Most Recent 10 months ago1edea48
10 months, 3 weeks ago850bc48
9 months, 1 week ago3dk1
7 months, 3 weeks agoa4e15bd
10 months, 3 weeks ago