An organization is reviewing their network log policies to ensure they can effectively identify unauthorized access attempts. Which of the following logging details should the organization prioritize to BEST meet this objective?
The total amount of data transferred during each session
Record the source IP address for all incoming traffic
Username associated with each session initiation
Timestamps of data transfer