A security analyst is receiving several alerts per user and is trying to determine if various logins are malicious. The security analyst would like to create a baseline of normal operations and reduce noise. Which of the following actions should the security analyst perform?
stoneface
Highly Voted 2 years, 10 months agoT_dawg
2 years, 3 months agoSwarupam
2 years, 9 months agoenginne
2 years, 9 months agorodwave
Highly Voted 2 years, 7 months ago[Removed]
Most Recent 1 year, 9 months agosujon_london
1 year, 10 months agoSeWiz
1 year, 3 months agoRevolutionaryAct
1 year, 10 months agoRevolutionaryAct
1 year, 9 months agoApplebeesWaiter1122
1 year, 11 months agoYawannawanka
2 years, 2 months agoKid_lela
2 years, 3 months agoT_dawg
2 years, 3 months agoscarceanimal
2 years, 4 months agoFMMIR
2 years, 6 months agoSandon
2 years, 6 months agokennyleung0514
2 years, 8 months agousam2021
2 years, 9 months ago