Solution Overview

Unauthorized access can be monitored by using the ETERNUS DX's audit log collection and transfer function. Use acquired audit log information as audit trail information to monitor and track suspicious operations and access.