Overview

Enterprise Security includes an auditing feature that allows you to monitor user actions.

You can configure auditing to:

To audit user actions within a specific domain, enable auditing for the domain, and specify which actions to audit. To write audit information to a database, set up the audit database, and enable the connection cache database Service Provider Interface (SPI). When an audited event occurs, the default SPI implementation generates an XML-formatted string, stamps the output with a Greenwich Mean Time (GMT) timestamp, and writes it to an audit log. If you write a custom SPI, neither the XML string nor the timestamp are required.