It is considered a best practice to log all security-related events, so they are recorded in the database and available for reporting in the Activity trails task.
It is considered a best practice to log all security-related events, so they are recorded in the database and available for reporting in the Activity trails task.