Discussion Identify unusual behavior: Log program executions against policy violations.