github.com/aquasecurity/trivy-iac@v0.8.1-0.20240127024015-3d8e412cf0ab/avd_docs/azure/network/AVD-AZU-0049/docs.md (about) 1 2 Flow logs are the source of truth for all network activity in your cloud environment. 3 To enable analysis in security event that was detected late, you need to have the logs available. 4 5 Setting an retention policy will help ensure as much information is available for review. 6 7 ### Impact 8 Not enabling retention or having short expiry on flow logs could lead to compromise being undetected limiting time for analysis 9 10 <!-- DO NOT CHANGE --> 11 {{ remediationActions }} 12 13 ### Links 14 - https://docs.microsoft.com/en-us/azure/network-watcher/network-watcher-monitoring-overview 15 16