This option audits both successful changes and failed attempts to system and configuration files, allowing you to determine ...

This option audits both successful changes and failed attempts to system and configuration files, allowing you to determine who changed system or configuration files, as well as detect attempts to make unauthorized changes. It will degrade system performance more than auditing just successful activities.