Chapter content7.1. Starting and stopping Airlock IAM (system service integration)7.2. Sandboxing with profiles7.3. Generating Airlock IAM log output7.4. Processing Airlock IAM log output7.5. User trail logging7.6. Log message formats7.7. Monitoring/health checks7.8. Performance tuning and scaling best practices7.9. Data backup and restore7.10. Connection drop with slash and/or backslash in the username