HPlogo HP Security Monitor/iX Manager's Guide: HP 3000 MPE/iX Computer Systems > Chapter 2 Overview of Security on the MPE/iX Computer System

Auditing System Usage

» 

Technical documentation

Complete book in PDF
» Feedback

 » Table of Contents

 » Index

When activated, the MPE/iX system logging facility maintains log records of system use. For example, these records can tell you how often abortive logons are attempted, and identify the devices from which the attempts were made. For systems in which security is important, log records should be reviewed regularly and often. For more information on system logging see the Auditing System Use chapter of this manual.

Feedback to webmaster