We match the data with the threat intelligence we use. The customer can only consult his own data in the portal. The local DNS logs are linked to the DNS queries.
We match the data with the threat intelligence we use. The customer can only consult his own data in the portal. The local DNS logs are linked to the DNS queries.