Yes. Next to comprehensive Audit Trail Logs, our network device logs are sufficiently detailed to support incident investigations.
In accordance with all relevant internal Policies, compliance requirements and common best practices, all logs are retained for as long and in such detail as indicated, and can be used in forensic analysis if necessary.