Analyze Log File

Upload a system or network log to scan for intrusion threats.

network model ready
system model ready

Files are analyzed in memory and not stored on disk.