Vigilance’s view of U of T’s data remains the same. Vigilance currently has access to the logs of deployed endpoints to conduct threat hunting and investigations as necessary; this does not change.