This seems like a straightforward project management question. I think the risk owner would be the best person to respond, since they would be responsible for implementing the preplanned risk response.
Alright, I've got a strategy for this. I'll focus on the keywords and directionality in the rules to determine which one is specifically looking for FTP root logins.
I'm a little confused by the options here. Live Query Statistics and Client Statistics don't sound like they would provide the level of detail we need. I think I'll go with the actual execution plan, but I'm not 100% sure that's the best choice.
Clay
4 months agoAlisha
4 months agoFlo
4 months agoRory
4 months agoLashawnda
4 months agoSilvana
5 months agoCelia
5 months agoAntonio
5 months agoJoaquin
5 months agoBulah
5 months agoGeraldine
5 months agoErnie
5 months agoJeffrey
5 months ago