Request for: Security logs and audit trail Compliance and vulnerability reports Threat intelligence or activity analysis