. "The security log records events such as valid and invalid logon attempts, as well as events related to resource use, such as creating, opening, or deleting files or other objects." . . . .