github.com/aquasecurity/trivy-iac@v0.8.1-0.20240127024015-3d8e412cf0ab/avd_docs/azure/network/AVD-AZU-0049/docs.md (about)

     1  
     2  Flow logs are the source of truth for all network activity in your cloud environment. 
     3  To enable analysis in security event that was detected late, you need to have the logs available. 
     4  			
     5  Setting an retention policy will help ensure as much information is available for review.
     6  
     7  ### Impact
     8  Not enabling retention or having short expiry on flow logs could lead to compromise being undetected limiting time for analysis
     9  
    10  <!-- DO NOT CHANGE -->
    11  {{ remediationActions }}
    12  
    13  ### Links
    14  - https://docs.microsoft.com/en-us/azure/network-watcher/network-watcher-monitoring-overview
    15  
    16