footboy8339 footboy8339 19-12-2022 Computers and Technology contestada what are two pieces of log information you would want when reviewing a potentially infected endpoint?