A security alert was triggered when an end user tried to access a website that is not allowed per organizational policy. Since the action is considered a terminable offense, the SOC analyst collects the authentication logs, web logs, and temporary files, reflecting the web searches from the user's workstation, to build the case for the investigation. Which of the following is the best way to ensure that the investigation complies with HR or privacy policies?
botla
5 days, 1 hour agoCyberMom
1 month, 1 week agocaptaintoadyo
4 months, 2 weeks agodave_delete_me
4 months, 2 weeks agoLifeElevated
9 months, 1 week agokmordalv
1 year ago