Thanks, that helps a lot.
Is there no way to examine the data outside of LEM? We have auditors and outside security firms that want to examine LEM logs. What options do we have?
Thanks, that helps a lot.
Is there no way to examine the data outside of LEM? We have auditors and outside security firms that want to examine LEM logs. What options do we have?