Chapter 6: Auditing

This chapter describes how to set up a secured environment to audit user activities.