The possibilities are limitless. It all depends on what data is available and what you want to have visibility into. Aside from logins, you might want to track disk/CPU utilization, server outages, server logs, hardware/software assets on the network, and so on.