23.8.2 Notes on using the security audit facility

You should take note of the following when you use the security audit facility: