This function is very helpful in investigating an unauthorized user activity as outlined in blog post http://www.sqlskills.com/blogs/paul/finding-out-who-dropped-a-table-using-the-transaction-log/The comments section has use examples.
↧