An analyst is investigating an anomalous event reported by the SOC. After reviewing the system logs; the analyst identifies an unexpected addition of a user with root-level privileges on the endpoint. Which of the following data sources will BEST help the analyst to determine whether this event constitutes an incident?
Cock
Highly Voted 2 years, 2 months agodb97
Highly Voted 2 years, 2 months ago2Fish
2 years, 1 month agognnggnnggnng
Most Recent 2 years, 2 months ago