This document describes the configuration and use of audit logs. Using audit logs, it is possible to record access to properties, calls to actions or applications and the review of access rights.