Mechanisms exist to generate log entries on embedded devices when configuration changes or attempts to access interfaces are detected.
Does the organization generate log entries on embedded devices when configuration changes or attempts to access interfaces are detected?