Event Logs
To meet Common Criteria guidelines for audit records, there is an event log within the Compliance section. All user activity in the Security Intelligence Platform is captured so that all actions can be traced back to a user.
Permission Requirements
A user will need to be a member of a user group with the following minimum permissions granted:
-
Administration
-
Event Logs
-
-
Module
-
Administration
-
Security Manager
-
Open the Event Log Page
To open the Event Log page, on the toolbar, click Compliance > Event Log.
Events Log List
The following table defines the values in the Event Log table. The order listed is ascending by Date/Time.
Value | Description |
---|---|
Date/Time | The a timestamp of the event. |
User | Who triggered the event. |
Category | The component area in the module that was affected by the event. |
Action | The type of event that occurred. |
Description | Provides additional information about the event, such as Device Name for Device Updated. |
Filter Event Logs
To apply one or more filter bricks to the event log table, complete the following steps.
- On the Event Log page, click Add Filter.
The Add Filter dialog opens, showing the devices criteria you can filter, such as Actions or Date Range.
- Select a filter object, such as Date Range.
- Select a filter operator, such as Equals.
-
Enter the needed filter data.
- Click Apply.
Export as CSV
To export an event log, click Export CSV.