How are locally cached usernames and passwords cleared from the memory of a R77 Security Gateway?
Is it possible to track the number of connections each rule matches in a Rule Base?
Your boss wants you to closely monitor an employee suspected of transferring company secrets to the competition. The IT department discovered the suspect installed a WinSCP client in order to use encrypted communication. Which of the following methods is BEST to accomplish this task?