Access Logs

Detailed records of who accessed a system, what actions were performed, and when, for security monitoring.