A complete all-inclusive auditing solution must
be implemented that can easily accomplish each of the following
key areas:
- Access and Authentication Auditing
- User and Administrator Auditing
- Suspicious Activity Auditing
- Vulnerability and Threat Auditing
- Change Auditing