To prevent the vulnerability from being accessed without permission and checking to ensure that the system is set up to store the Security Log and the Event Log is adequately.
To prevent vulnerabilities from being accessed by unauthorized. And make sure that the system is set up to store the Security Log and Event Log adequately.