This is a dedicated watch page for a single video.
During a routine security review, your team identified a suspicious login attempt using a highly privileged and frequently used service account from an unknown IP address. You need to investigate this potential security incident to respond effectively. What should you do?