btmp user.log wtmp auth.log admin See author's posts Post navigation The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what? You are monitoring the network of your organization. You notice that 1. There are huge outbound connections from your Internal Network to External IPs. 2. On further investigation, you see that the External IPs are blacklisted. 3. Some connections are accepted, and some are dropped. 4. You find that it is a CnC communication. Which of the following solution will you suggest?