Audit trails track technique exercise so that when a security breach happens, the system and extent on the breach can be determined. Storing audit trails remotely, in which they are able to only be appended to, can continue to keep burglars from covering their tracks.Applications are executable code, so standard company apply is to limit or block u