Michael would view the firewall log to track employee actions on the organization’s network. Firewall logs are records of events that are captured by the firewall. They typically include details about allowed and denied traffic, network connections, and other transactions through the firewall. By analyzing these logs, network administrators can monitor network usage, detect unusual patterns of activity, and identify potential security threats or breaches.
References: The importance of monitoring firewall logs is emphasized in the EC-Council’s Certified Network Defender (C|ND) program. It is part of the network traffic monitoring and analysis, which is crucial for detecting and responding to incidents on the network123.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit