Monitor and Log Events

It's highly recommended that you log and monitor device events (including device operations and calls). The importance of monitoring device events is that you can quickly detect unauthorized access and subsequently take counter measures to effectively terminate the attacker before any potential damage is done to your network.