This chapter describes the system actions when the set policy is valid and how to use the collected logs.