Auditing and alarm generation will be performed on the following operations:
Per system ACL-generated audits at:
Object open.
Object close.
Privilege checks.
System ACL access attempts.
Windowstation creation and destruction.