This chapter contains recommendations for implementing auditing in a Siebel Business Applications deployment so that suspicious activities are detected. This chapter contains the following topics:
Operating System Auditing
Database Auditing
Siebel Business Applications Event Logging
About Siebel Audit Trail