This figure illustrates the environment in which you can audit proxy users. In this figure, from left to right, top to bottom, are the following components: