github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/avd_docs/azure/network/AVD-AZU-0049/docs.md (about)

     1  
     2  Flow logs are the source of truth for all network activity in your cloud environment. 
     3  To enable analysis in security event that was detected late, you need to have the logs available. 
     4  			
     5  Setting an retention policy will help ensure as much information is available for review.
     6  
     7  ### Impact
     8  Not enabling retention or having short expiry on flow logs could lead to compromise being undetected limiting time for analysis
     9  
    10  <!-- DO NOT CHANGE -->
    11  {{ remediationActions }}
    12  
    13  ### Links
    14  - https://docs.microsoft.com/en-us/azure/network-watcher/network-watcher-monitoring-overview
    15  
    16