<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/fd8f8a52c3674232968e0ec12b4f95be&quot; frameborder=&quot;0&quot; width=&quot;2300&quot; height=&quot;1725&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>1725</height><width>2300</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>1725</thumbnail_height><thumbnail_width>2300</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/fd8f8a52c3674232968e0ec12b4f95be-c29ca16148e9f8e3.gif</thumbnail_url><duration>108.116</duration><title>Security Access Logs Dashboard</title><description>In this video, I provide an overview of our security access logs dashboard, which offers a centralized view of recent system access activity. This tool is essential for enhancing visibility into who is accessing our critical communication infrastructure, detailing what occurred and which systems were involved. It aids in security auditing, compliance tracking, and detecting unauthorized logins. I encourage IT and security teams to utilize this panel to track activity patterns and ensure access aligns with our internal policies. Please review the detailed log entries to familiarize yourself with the data and improve our security measures.</description></oembed>