This topic provides examples and descriptions of the audit logs when a storage system receives commands sent from hosts, or computers using
Command Control Interface.
The descriptions are listed alphabetically by function name and operation name.