You can also produce ad hoc reports that address special situations. For example, if you suspect that one of your users has suspicious access patterns, you might audit the user and produce a one-time report of the activity.
|
Copyright © 2009 CA.
All rights reserved.
|
|