Information must be periodically audited for secure network operation. The following information can be audited:
Validity: Information to be sent must comply with the format required by the Syslog protocol.
Integrity: Information must include various user operations, exceptions, and key events.