![]() |
![]() |
|
|
![]() |
![]() |
HP Security Monitor/iX Manager's Guide: HP 3000 MPE/iX Computer Systems > Chapter 2 Overview of Security on the MPE/iX Computer System![]() Auditing System Usage |
|
When activated, the MPE/iX system logging facility maintains log records of system use. For example, these records can tell you how often abortive logons are attempted, and identify the devices from which the attempts were made. For systems in which security is important, log records should be reviewed regularly and often. For more information on system logging see the Auditing System Use chapter of this manual. |
![]() |
||
![]() |
![]() |
![]() |
|||||||||
|