Protocols (Regular Profile) : Managing Audit, Shadowing and Alerts for Protocols : Audit and Shadowing Rights : Social Networks
  
Social Networks
Audit and shadowing rights applicable to the Social Networks protocol:
Audit: Connection - Enables the auditing of user attempts to connect to a social networking site.
The Connection action, the IP address with the port number and the name of the host, the name of the protocol are written to the log. If IP address to host name resolution fails, the host name is not written to the log.
Audit: Outgoing Messages - Enables the auditing of user attempts to send messages, comments, posts, etc.
The Outgoing Message action and information to identify the sent content (<site_name>: <content_name>_<Recipient ID>) are written to the log. Recipient IDs, in a numeric form, are only written to the log upon users attempt to send messages.
Audit: Outgoing Files - Enables the auditing of user attempts to upload media and file content to a social networking site.
The Outgoing File action and information to help identify the uploaded file (<site_name>: <file_name>) are written to the log.
Shadowing: Outgoing Messages - Enables the shadow copying of sent messages, comments, posts, etc.
Shadow copies of sent messages, comments, etc. are written to the log.
Shadowing: Outgoing Files - Enables the shadow copying of files uploaded to a social networking site.
Shadow copies of uploaded files are written to the log.