Settings changes are recorded in the settings change log. Security-sensitive actions are recorded in the security audit log.