As part of your organization's zero trust strategy, you use Identity-Aware Proxy (IAP) to protect multiple applications. You need to ingest logs into a Security Information and Event Management (SIEM) system so that you are alerted to possible intrusions.
Which logs should you analyze?
gcp4test
Highly Voted 1 year, 8 months agozanhsieh
Most Recent 4 months, 2 weeks agoPime13
4 months, 2 weeks agoBPzen
4 months, 4 weeks agoMr_MIXER007
7 months, 3 weeks ago3d9563b
9 months, 1 week agojujanoso
9 months, 3 weeks agoglb2
1 year, 1 month agodesertlotus1211
1 year, 2 months agocyberpunk21
1 year, 8 months agoMithung30
1 year, 8 months ago