Originally Posted by shabbir
Don't expect to just do the find in the log for the keyword threat and report it. There should be some process in your company to study the log and try to understand that
The company is using Tenable Security Center. But how do I whether it's a real threat or just a false positive? We are also encouraged to use wireshark and Win32 Telnet and SSH client such as putty.