Planning security auditing

The security auditing function is optional. You must take specific steps to set up security auditing.

To plan the use of security auditing on your system, follow these steps:

  • Determine which security-relevant events you want to record for all system users. The auditing of security-relevant events is called action auditing.
  • Check whether you need additional auditing for specific users.
  • Decide whether you want to audit the use of specific objects on the system.
  • Determine whether object auditing should be used for all users or specific users.