Your network was the target of an attack last week. You want to learn more about the source of the attack. What monitoring tools can you use to get started? (Select one.)
Users cannot download a PDF file from your intranet. You know the file is safe to download. When you review the log messages, you see that IntelligentAV identified the file as malicious. The only way to resolve this is to change the file extension.