Hacker News
new
past
comments
ask
show
jobs
points
by
ronbenton
18 hours ago
|
comments
by
12_throw_away
3 hours ago
|
next
[-]
I dunno. It seems kinda bad that core auth log - which should be a primary source of truth during, say, a security audit - seems to work on a best-effort basis?
reply
by
ares623
17 hours ago
|
prev
|
[-]
It takes a village of exploits to raise a successful and undetected attack.
reply
by
BoredPositron
15 hours ago
|
parent
|
[-]
Microsoft standpoint is probably: If it's undetected was there really an attack?
reply