As part of your organization's zero trust strategy, you use Identity-Aware Proxy (IAP) to protect multiple applications. You need to ingest logs into a Security Information and Event Management (SIEM) system so that you are alerted to possible intrusions.
Which logs should you analyze?
gcp4test
Highly Voted 1 year, 3 months agoMr_MIXER007
Most Recent 2 months, 3 weeks ago3d9563b
4 months agojujanoso
4 months, 2 weeks agoglb2
8 months, 1 week agodesertlotus1211
9 months, 2 weeks agocyberpunk21
1 year, 3 months agoMithung30
1 year, 3 months ago