Is there a way to determine what applications and files a remote user accessed? I know there is a log, but the interpretation does not seem obvious.
Thanks
Bill