The system administrator can use the Contents Tampering Monitor to automatically monitor tampering with Web contents (hereafter referred to as contents) and receive messages if tampering is detected.
This chapter explains how to use the Contents Tampering Monitor.