Determining capture rates from log files in Security Analytics