Vigilance’s view of U of T’s data remains the same. Vigilance currently has access to the logs of deployed endpoints to conduct threat hunting and investigations as necessary; this does not change.
Experiencing phishing, fraud, or another security incident? Report an incident
Vigilance’s view of U of T’s data remains the same. Vigilance currently has access to the logs of deployed endpoints to conduct threat hunting and investigations as necessary; this does not change.