Monitoring the creation or modification of objects gives you a way to track potential security problems, helps to ensure user accountability, and provides evidence in the event of a security breach.
The most common types of events to be audited are:
- Access to objects, such as files and
- Management of user accounts and group
- Users logging on to and logging off from the
This section contains: