These are the event logs that will help you identify malicious activity on your network. Follow TECH(talk) for the latest tech news and discussion! ---------------------------------- SUBSCRIBE: FACEBOOK: TWITTER: IDG ENTERPRISE WEBSITES Computerworld: CIO: CSO: InfoWorld: Network World:











