This topic provides examples and descriptions of the audit logs produced by data encryption operations.
The descriptions are listed alphabetically by function name and operation name. For detailed information on the version numbers in log output examples, see the table for format changes for each version number in Log output formats for different versions.