How Administrators Are Informed of Any
Security Anomalies (Including Data
Breaches)
How Administrators Are Informed of Any Security Anomalies
Security Anomaly Type Where to Check Recommended Frequency to
Check
All access and user activities Log files record user activities and
all login attempts (successful and
unsuccessful)
Daily
14