A log is a chronological record of system activities sufficient to enable the reconstruction and examination of the sequence of environments and activities surrounding or leading to an operation, procedure, or event in a security-relevant transaction, from inception to final results.

Log settings include: