Audit User Access Logs for Anomalies
Description
Review access logs for suspicious patterns such as unusual frequency, failed attempts, or odd access times.
Prompt
Analyze this user access log export. Identify users or IP addresses with unusual access frequency, after-hours logins, or failed attempts. Flag suspicious patterns and summarize results in a security review format.
Tags
ITSecurityData