upvote
I dunno. It seems kinda bad that core auth log - which should be a primary source of truth during, say, a security audit - seems to work on a best-effort basis?
reply
It takes a village of exploits to raise a successful and undetected attack.
reply
Microsoft standpoint is probably: If it's undetected was there really an attack?
reply