Which policy type should be used to detect and alert on cryptominer network activity?
View users who enabled console access with both access keys and passwords: config from cloud.resource where api.name = 'aws-iam-get-credential-report' AND json.rule = access_key_1_active is true or access_key_2_active is true and password_enabled is true https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-rql-reference/rql-reference/config-query/config-query-examples
Limited Time Offer
25%
Off
Mitzie
1 months agoGilberto
1 months agoHubert
5 days agoDulce
16 days agoLai
1 months agoFrederica
8 days agoMaynard
20 days agoSang
22 days agoZachary
2 months agoLili
11 days agoLashon
15 days agoMarylin
1 months agoJani
2 months agoCyril
6 days agoSommer
11 days agoMargo
1 months agoJose
1 months agoLaura
2 months agoAshlyn
2 months agoNobuko
2 months agoToi
2 months agoLudivina
3 months agoJunita
3 months ago