A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log: graphic.ssh_auth_log.
Which of the following actions would BEST address the potential risks posed by the activity in the logs?
lordguck
Highly Voted 2 years, 7 months agomargomi86
Highly Voted 9 months, 1 week agobeazzlebub
2 years, 3 months ago2184bef
Most Recent 2 weeks agolionleo
2 weeks, 6 days agoBright07
3 months, 3 weeks ago1llustrious
4 months agoblacksheep6r
4 months, 3 weeks agoAkashGaikwad
6 months, 1 week agomabus
8 months agoBiteSize
9 months, 1 week agoBright07
1 year agosmqzbq
2 years, 3 months ago