As we digged through the logs, it is difficult to identify which user has modified the files.
As we digged through the logs, it is difficult to identify which user has modified the files.