Chapter 6: Auditing
This chapter describes how to set up a secured environment to audit user activities.