Definitely C. Logging everything is the way to go - can't have too much information when it comes to security and compliance. Plus, it'll make the network admins' lives a little easier too.
I'm tempted to go with E, as logging syslog errors above a certain severity level could also be valuable. But I think C is the more comprehensive option overall.
I agree, C is the best choice here. Monitoring both access and commands is essential for maintaining visibility and control over administrative activities.
Option C seems to cover the most ground, including both device access and command entry attempts. Logging these details is crucial for security and auditing purposes.
Shawnda
13 days agoLavonda
22 days agoCherry
1 days agoRuby
2 days agoKeva
1 months agoJerrod
20 days agoCarmen
1 months agoVenita
2 months agoHillary
18 days agoDong
19 days agoErick
2 months agoKina
2 months agoLeslee
2 months agoMeaghan
2 months agoShannon
Cherilyn
3 days agoMy
23 days ago