A company wants to enhance its threat intelligence capabilities by utilizing accessible internal sources. Which of the following would be the most useful internal source for detecting anomalies on the network?
Human resources databases
CMDB
Corporate policies and procedures
Log data from network devices