The document discusses using Extended Events in SQL Server to perform security audits. It describes the components of Extended Events including events, actions, predicates, targets, and packages. It then provides examples of how to build audits to track logins and queries, demonstrating how to capture useful security information without invasive monitoring. Templates are shown for login and query audits that can be directed to file, ring buffer, or event stream targets.