This section provides information about how to interpret the reports that extract security audit data from the Event Console Log.
Also included in this topic are instructions about how to use the UNIX/Linux platform whohas and whathas commands and interpret the reports they generate.
|
Copyright © 2010 CA.
All rights reserved.
|
|