A Security Administrator is analyzing the logs for a Virtual Service before and after enabling a WAF policy. Before WAF was enabled, a typical log for a successful transaction appeared as a "Non-Significant Log".
How does the nature of logging change for that same transaction after the WAF policy is enabled and set to 'Enforcement' mode?
A. Successful transaction logs will no longer be generated to save space.
B. All logs, including successful ones, are now classified as "Significant Logs".
C. The transaction log will now include a WAF section detailing the rules evaluated, even if no threat was detected.
D. The log format remains identical, but a separate "WAF Event" is created in the Events tab.