Access Logs hold information about the rights an Access Control system grants or denies over a period of time.

In Unix systems, access logs are frequently maintained by the syslog daemon, and are stored as text files in the /var/log or /usr/adm directory.

On Windows NT systems, an event logging mechanism and the Event Log program are used to manage such logs.

On most systems, the detail maintained by Access Logs is configurable.

Return to IT Security Concepts