System Login Activity and Access Monitor
This option group section of the policy monitors the system access activity that may indicate illegitimate activity. Portions of this section also monitor the successful logon attempts of individuals through various means. These monitoring areas can be used for the following tasks:
- To acquire a timeline of when an individual logon to a specific system has occurred.
- To detect other suspicious system access activity.
- To alert on brute force password attempts.