4. Implementing Security Auditing : Security Auditing : Access to the Security Audit Log
 
Share this page                  
Access to the Security Audit Log
Access to the security audit log is established through registering the security audit log file as a virtual table. After it has been successfully registered, the security audit log file can be queried as any other table.