A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log: graphic.ssh_auth_log.
Which of the following actions would BEST address the potential risks posed by the activity in the logs?
lordguck
Highly Voted 2 years, 1 month agoAkashGaikwad
Most Recent 3 weeks, 3 days agomabus
2 months, 1 week agomargomi86
3 months, 2 weeks agobeazzlebub
1 year, 9 months agoBiteSize
3 months, 2 weeks agoBright07
7 months, 2 weeks agosmqzbq
1 year, 10 months ago