A SOC receives several alerts indicating user accounts are connecting to the company’s identity provider through non-secure communications. User credentials for accessing sensitive, business-critical systems could be exposed. Which of the following logs should the SOC use when determining malicious intent?
linkmonkey239
Highly Voted 4 months, 3 weeks agoSusan4041
Most Recent 2 days, 18 hours agozecomeia_007
4 months, 3 weeks agoCimoooooo
5 months agoChopSNap
5 months ago