Since the logs on the endpoint were deleted, the next best option for the analyst is to examine firewall logs. Firewall logs can reveal external communication, including outbound traffic to a command-and-control (C2) server. These logs would contain information about the IP addresses, ports, and protocols used, which can help in identifying suspicious connections. IPS logs may provide information about network intrusions, but firewall logs are better for tracking communication patterns. ACL logs (Access Control List) are useful for tracking access permissions but not for identifying C2 communication. Windows security logs would have been ideal if they had not been deleted