Date & Time
Wednesday, May 21, 2025, 11:00 AM - 11:45 AM
Name
Strategies for Using Security Audit Logs
Description
We'll explore effective strategies for using the Security Audit Log, providing real-world examples to demonstrate its capabilities. Attendees will learn how to track user activities and configure audit setting to control the level of data stored in the logs for enhanced security monitoring.
Track
IT Services
Content Level
Intermediate
Speakers
Shuntavia Johnson - TruBridge