A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?
metzen227
Highly Voted 11 months, 1 week agoe5c1bb5
Highly Voted 11 months, 1 week agoslackbot
Most Recent 3 weeks, 1 day agojustin_es6
7 months, 3 weeks agodbrowndiver
8 months, 2 weeks agoSHADTECH123
11 months agoshady23
11 months, 1 week agoe5c1bb5
11 months, 1 week ago