Audit logs in IT security are the data in which the computer stores them so that in case of any security issue in the information system, these logs can be referenced. The information which is contained in the logs are files pertaining to all the transactions being undertaken in the computer system. These logs can be attempts such as login success or failure or files access failure or success. They are able to show the threats which are attempting to log into the system without permission.