Definitely C. Logging everything is the way to go - can't have too much information when it comes to security and compliance. Plus, it'll make the network admins' lives a little easier too.
I'm tempted to go with E, as logging syslog errors above a certain severity level could also be valuable. But I think C is the more comprehensive option overall.
I agree, C is the best choice here. Monitoring both access and commands is essential for maintaining visibility and control over administrative activities.
Option C seems to cover the most ground, including both device access and command entry attempts. Logging these details is crucial for security and auditing purposes.
Shawnda
2 months agoVenita
13 days agoSuzan
19 days agoMike
21 days agoTatum
22 days agoLavonda
2 months agoFelix
1 months agoCherry
2 months agoRuby
2 months agoKeva
3 months agoEttie
1 months agoMarsha
1 months agoJerrod
2 months agoCarmen
3 months agoVenita
3 months agoHillary
2 months agoDong
2 months agoErick
3 months agoKina
3 months agoLeslee
3 months agoMeaghan
3 months agoTiera
1 months agoShannon
2 months agoCherilyn
2 months agoMy
2 months ago