github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/avd_docs/azure/network/AVD-AZU-0049/docs.md (about) 1 2 Flow logs are the source of truth for all network activity in your cloud environment. 3 To enable analysis in security event that was detected late, you need to have the logs available. 4 5 Setting an retention policy will help ensure as much information is available for review. 6 7 ### Impact 8 Not enabling retention or having short expiry on flow logs could lead to compromise being undetected limiting time for analysis 9 10 <!-- DO NOT CHANGE --> 11 {{ remediationActions }} 12 13 ### Links 14 - https://docs.microsoft.com/en-us/azure/network-watcher/network-watcher-monitoring-overview 15 16