You are an information system auditor of HDA Inc. You are auditing a video-monitored and proximity card-controlled communications room and want to review all access attempts. What would be the most helpful tool or method for the auditor in this case?