An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization’s public cloud to send telemetry using the cloud provider’s mechanisms to a security device.
Which mechanism should the engineer configure to accomplish this goal?
A . mirror port
B . NetFlow
C . Flow
D . VPC flow logs
Answer: B