Viewing the Security Log

The security log file describes all the security changes, such as password changes, that have been made.

View the server log in the cluster log file.