Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)
Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)
To identify unusual network and user activity, anomaly policies typically use network flow logs and audit logs. Network flow logs provide information on the traffic patterns and connections within the network, which can help in spotting deviations from normal behavior. Audit logs record user activities and actions, offering insights into any unusual user behavior or access patterns. Combining these two sources of data allows for a comprehensive analysis of both network and user activities, making it possible to identify anomalies effectively.
AB https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/anomaly-policie
AB Anomaly policies use audit logs and network flow logs to help you identify unusual network and user activity for all users
Ahttps://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/anomaly-policiesB