Threats and Exposures › SYSLOG
Most activity in the system is recorded in the SYSTEM LOG. When auditing SYSLOG, look for holes in times of the log.