Are cloud and microservices becoming a part of your strategy?Are there any errors, messages or other information?Do you find all involved systems and users involved in the attack?Does deep discovery app detect advanced thre