Answer:
It is, as long as all the logs are saved and searchable. Retention Recommendations. Logs that provide an effective source of data for identifying targeted attacks as well as helping to determine what actions have been taken need to be protected.
Step-by-step explanation: