Print This Page
From a security standpoint, monitoring the change logs and comparing it to configuration management changes could detect unauthorized change in the environment.