What are two system-level logs that can be purged using application configuration? (Choose two.)
A security analyst has reported unauthorized access to System Configuration. You must review the user's current level of access, and then restrict their access according to your organization's requirements. As part of your auditing process, which two actions should you perform? (Choose two.)
When deleting a user account on FortiSOAR, you must enter the user ID in which file on FortiSOAR?