Monitoring Data

Monitoring Data are generated by security tools during routine processes. These data include user information (e.g., usernames and IP addresses) as well as logs of activities on endpoints, networks, accounts, and applications.

The OIS and vendor partners use automatic and manual processes to review these data for indicators of potential malicious activity and during forensic investigations of cyber security incidents.