In incident response, which log would contain entries about security software alerts and policy violations on endpoints?

Prepare for the Computer Hacking Forensic Investigator v11 exam. Study with flashcards and multiple choice questions. Each question includes hints and explanations. Get exam-ready efficiently!

Multiple Choice

In incident response, which log would contain entries about security software alerts and policy violations on endpoints?

Explanation:
Security software logs on endpoints are the primary source for entries about alerts and policy violations. These logs come from antivirus, EDR, and other protection tools and capture detections, blocks, quarantines, and policy enforcement actions. They provide the most direct view of what the security tools flagged or prevented on the device, which is essential for understanding the threat and the response. Operating system logs document a broad range of system events but aren’t focused on security detections from protective software. Audit logs track user actions and compliance-related events, not the ongoing security alerts from protection tools. Application logs record events from individual applications and don’t reflect centralized security enforcement across the endpoint. Therefore, the most relevant source for security alerts and policy violations is the security software logs.

Security software logs on endpoints are the primary source for entries about alerts and policy violations. These logs come from antivirus, EDR, and other protection tools and capture detections, blocks, quarantines, and policy enforcement actions. They provide the most direct view of what the security tools flagged or prevented on the device, which is essential for understanding the threat and the response. Operating system logs document a broad range of system events but aren’t focused on security detections from protective software. Audit logs track user actions and compliance-related events, not the ongoing security alerts from protection tools. Application logs record events from individual applications and don’t reflect centralized security enforcement across the endpoint. Therefore, the most relevant source for security alerts and policy violations is the security software logs.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy