Analyze Log File
Upload a system or network log to scan for intrusion threats.
●
network model ready
●
system model ready
Files are analyzed in memory and not stored on disk.
Upload a system or network log to scan for intrusion threats.
Files are analyzed in memory and not stored on disk.