Recommended Security Audit Usage

<< Click to Display Table of Contents >>

Navigation:  Security Audit Application >

Recommended Security Audit Usage

Previous pageReturn to chapter overviewNext page

This section provides examples on how the Security Audit Log may be used during a Periodic Security Review or Security Investigation.