If you need to maintain a security log of access attempts, you can use the access logging feature to do so.
See BEGIN LOGGING.
If you need to maintain a security log of access attempts, you can use the access logging feature to do so.
See BEGIN LOGGING.