If a technician wants to know when a computer application is accessing the network, which of the following logs should be reviewed?