- cross-posted to:
- technology@lemmy.world
- cross-posted to:
- technology@lemmy.world
Missing logs could make it more difficult to identify unauthorized access to the customers’ networks during that two-week window.
Missing logs could make it more difficult to identify unauthorized access to the customers’ networks during that two-week window.
And exactly why are they missing? Who stole what at Microsoft?