Permission Modification Reports
To search for and generate a report on activities related to modification of user permissions (for example, adding or deleting permissions) on selected log sources during a specified time interval, use the Permission Modification Real-Time Report.
In addition to setting the common report options in 
		Preparing a Real-time Report, you can select optional filter operators in the generated report. 
		
 
	 
Optional columns and filters can be sorted in ascending or descending order. Choose sort order using the drop-down menu. The optional filters are listed in the following table.
For information on saving the generated report, see Formats for Saving a Generated Report.
| Option | Description | 
|---|---|
| Source Device | Description of the device that sent these log messages | 
| User | User who is making the inquiry | 
| Action | Action taken | 
| Status | Status of the connection | 
| Source IP | IP address of the source host device | 
| Source Domain | Domain of the source host device | 
| Target User | User for whom inquiry is being made | 
| Target IP | IP address of the accessed Appliance | 
| Target Domain | Domain of the accessed Appliance | 
| Type | Type of connection | 
| Originating Host | The original host name where the event was originally created | 
| Subsystem | The subsystem of the host | 
| Originating IP | The original source IP address where the event was originally created | 
| Event Name | Name of the event | 
| Application Type | The type of application that generated the event | 
| Count | Number of connections | 
Copyright © Cloud Software Group, Inc. All rights reserved.
