Figure 1

« 
Previous
|
|
Next
 »

Figure 1: Successful user access audit via Splunk for *nix.