The security administrator must design the network based on the site's security policy. The security policy for Oracle Solaris systems dictates configuration decisions, such as the following:
How much auditing is done for all users and for which classes of events
How much auditing is done for users in roles and for which classes of events
How audit data is managed, archived, and reviewed