This section describes the various ways you can determine whether the Access Manager is functioning normally and whether an Internet attack is in progress. This section discusses the following topics:
Section 31.0, Enabling Auditing
Section 32.0, Configuring Logging
Section 33.0, Viewing Statistics
Section 34.0, Managing Server Health
Section 35.0, Reviewing Command Status
Section 36.0, Reviewing Alerts