Summary

This chapter discussed viewing the access, error and audit logs.

Furthermore, we demonstrated how server and database activity can be monitored using various methods.