Join the IDNLearn.com community and start getting the answers you need today. Whether it's a simple query or a complex problem, our community has the answers you need.
According to the statement, the tool you should use is Event log.
Because, event logs are the best way to monitor and track firewall activity. Thus, they will provide a comprehensive record of all packets that have been rejected.
Firewalls are essential components of any secure network, providing a first line of defense against malicious actors and unwanted connections. As such, it is important to have a reliable and comprehensive record of the traffic that passes through the firewall.
Event logs are one of the most effective tools for monitoring and tracking the activity of the firewall, allowing administrators to quickly identify any suspicious activity, potential threats, or blocked connections.
Learn more about Firewall Management:
https://brainly.com/question/12130487
#SPJ4