When the WSA policy trace tool is used to make a request to the proxy, where is the
request logged?
A.
proxy logs
B.
access logs
C.
authentication logs
D.
The request is not logged
When the WSA policy trace tool is used to make a request to the proxy, where is the
request logged?
When the WSA policy trace tool is used to make a request to the proxy, where is the
request logged?
A.
proxy logs
B.
access logs
C.
authentication logs
D.
The request is not logged