This website uses Cookies. Click Accept to agree to our website's cookie use as described in our Privacy Policy. Click Preferences to customize your cookie settings.
I am aware that we can include the artifacts like source IP's to the
case but what I want to know is cant we attach the exact events we need
to a case? For example, we do a threat hunt and we found some suspicious
events. Is there a way to attach the...
Is Google SecOps support the following log collection protocols: Syslog
over Syslog NG, SDEE(Security Device Event Exchange), SNMP Version 2 &
3, ODBC, FTP, Windows Event Logging Protocol, Netflow