User`s guide

Application
Security
System
Use these tables to create your report based on the NT Current Event Log.
Note:
In order to report on the Security table, you need to have the User Right of "Manage auditing and
security log" added to your Policy in NT.
The data that you will see is the same data that is seen from the NT Event Viewer.
23.12 For additional information
This section has only touched on some of the more important aspects of database access, relational
databases, and SQL. If you are interested in learning more about database topics, refer to the
documentation provided with your DBMS application.
Note:
In addition, there are hundreds of books available on the market that discuss database theory and
design in depth. Look for the computer-related section at your local bookstore.
2012-03-14562
Understanding Databases