How to Investigate Suspicious Activity Across Company Devices