In alignment with your organization's zero trust strategy, Identity-Aware Proxy (IAP) is deployed to safeguard numerous applications. To bolster intrusion detection, logs need to be integrated into a Security Information and Event Management (SIEM) system. Which logs should be prioritized for analysis?