A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log: graphic.ssh_auth_log.
Which of the following actions would BEST address the potential risks posed by the activity in the logs?
lordguck
Highly Voted 2 years, 5 months agomargomi86
Highly Voted 7 months, 3 weeks agobeazzlebub
2 years, 1 month agoBright07
Most Recent 2 months, 1 week ago1llustrious
2 months, 2 weeks agoblacksheep6r
3 months, 1 week agoAkashGaikwad
4 months, 3 weeks agomabus
6 months, 2 weeks agoBiteSize
7 months, 3 weeks agoBright07
11 months, 2 weeks agosmqzbq
2 years, 2 months ago