<< Click to Display Table of Contents >>
Navigation: Security Audit Application >
This section provides examples on how the Security Audit Log may be used during a Periodic Security Review or Security Investigation.