Quote:
Originally Posted by shabbir View Post
Don't expect to just do the find in the log for the keyword threat and report it. There should be some process in your company to study the log and try to understand that

The company is using Tenable Security Center. But how do I whether it's a real threat or just a false positive? We are also encouraged to use wireshark and Win32 Telnet and SSH client such as putty.