With standard methods, there is not much you can do for analysis.
First of all you will find most common security eventid’s explained here: <a href=”http://www.monitorware.com/Common/en/SecurityReference/”>SecurityReference/</a>
With thirdparty tools you can create reports out of Security EventLog entries, for example using <a href=”http://www.eventconsolidator.com/”>EventConsolidator</a>
For an enterprise solution I recommend MonitorWare, more details here:
<a href=”http://www.monitorware.com/Common/en/articles/monitorware-products.php”>Monitorware Products</a>