Object accesses
It is necessary to audit object access to monitor users who access a given object (for example, the shadow password file).
It is necessary to audit object access to monitor users who access a given object (for example, the shadow password file).