Use Cases

The following table describes the main use cases of the Access Monitor feature.

Starting in Release 8.0, if there is no user with Audit Log Realm privileges, any user with Administration Realm privileges can perform any of these use cases.

Use Case

Supported Intel AMT Releases

Required Security Realms
(“ADMIN_SECURITY_...”)

Set the Signing Key Material

4.0 and later

AUDIT_LOG_REALM

Enable and Disable Auditing

4.0 and later

AUDIT_LOG_REALM

Enable and Disable Auditing of Events

4.0 and later

AUDIT_LOG_REALM

View the Audit Policy Details

4.0 and later

AUDIT_LOG_REALM

Set the Audit Storage Policy

5.1 and later

AUDIT_LOG_REALM

Lock and Unlock the Audit Log

4.0 and later

AUDIT_LOG_REALM

Get the Audit Log State

4.0 and later

AUDIT_LOG_REALM

Export the Audit Log Signature

4.0 and later

AUDIT_LOG_REALM

Read the Audit Log

4.0 and later

AUDIT_LOG_REALM

Clear the Audit Log

4.0 and later

AUDIT_LOG_REALM

 

See Also:

   Table mapping classes and methods to realms

 

Copyright © 2006-2022, Intel Corporation. All rights reserved.