VIII
Secure Auditing
Check online users regularly to ensure unauthorized accounts are not logged in to a device.
Check the equipment log to access the IP addresses used to login to devices and their key operations.