Show TOC

Configuring the Security Audit LogLocate this document in the navigation structure

Procedure

  1. Decide whether to use a static profile or change the filters dynamically and set the required parameters.

    For more information, see Preparing the Security Audit Log.

  2. Configure and activate the profile.

    For more information, see the following: