Log activity from background apps
— Processes run by services on the host that could raise security concerns.
Activities include: service restart, service install, service modified, cron modified, system update, system reboot, package source modified, package source added, iptables changed, secret modified, accounts modified, and sensitive files modified.