A few caveats:
Auditing has to be enabled in the system’s security policy and in the Access Control List of a resource to successfully log events
A few caveats:
Auditing has to be enabled in the system’s security policy and in the Access Control List of a resource to successfully log events