Security profiles generated, amended, or deleted by an administrator are
monitored to determine whether the administrator's actions are in
compliance with known security policies. Out-of-compliance commands
affecting the profiles are refused or otherwise modified to conform with
the policies, depending on the circumstances. Feedback of the failure to
comply may be provided and may take the form of a screen inquiry to the
administrator, a notification to the administrator that the profile has
been automatically modified, or a report of the transaction to a chief
administrator. In this manner, negligent and intentional failures to
comply with security policies by a local security administrator are
mitigated or eliminated.