UMROOT

These guidelines apply to security logs, such as Windows logs, which capture security information associated with users of university information services. The guidelines specifically address requests from unit system administrators to access security log information associated with computers that are under their purview for troubleshooting purposes.