Audit values

See “Auditing” in the Security Administration Guide for values that appear in the event column of sysaudits (specifically Table 18-2, which lists auditing options, requirements, and examples).