Security and Compliance has identified that data is being leaked through a third-party application connected to G SuiteÑŽ You want to investigate using an audit log. What log should you use?
D is correct option here, A cant be because its just log console activity, B successful and failed sign-ins to SAML applications using the SAML audit log, C is just for drive.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
[Removed]
3 years, 5 months agoKristuc
4 years, 1 month agoadmcloud
4 years, 5 months agosaurabh1805
4 years, 8 months agonwk
5 years ago