22.1.6 System configuration requirements

The following applies to use of the security audit facility: