Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Uploaded on Nov 11, 2010
Configure what files you want to monitor, what level of message to track, and use pattern-matching to include or exclude messages. Define alerts that are triggered by log events and monitor compliance with security policies by detecting and logging any physical or remote access into any host in your environment.