Using log settings, you can specify Organisation activity to be logged and how to store logs. Data anonymization lets you encrypt identities rein logs and reports. Rogue AP scan A rogue access point refers to any access point connected to your network without authorization. Attackers can use rogue access points for traffic sniffing and other pur