See Chapter 18, “Auditing” in the System Administration Guide: Volume 1 for encrypted columns auditing information (specifically Table 18-5, which lists the values in the event and extrainfo columns).