A Risk Rule generates events on Suspicious Cloud Share Activity and regularly contributes to confirmed incidents from Risk Notables. An analyst realizes the raw logs these events are generated from contain information which helps them determine what might be malicious.
What should they ask their engineer for to make their analysis easier?
CeeCapi
3 weeks agoNss_dfir
1 month, 2 weeks agoProfessorJayy
2 months, 3 weeks agoProfessorJayy
2 months, 3 weeks ago