Access Control Reports

To search for and generate reports on the number of times a selected log source executes an authentication rule, use Access Control reports.

The submenu that appears when you click Reports > Access Control, lists the reports that are available for each log source.

Accessing the Access Control Reports

Choose Reports > Access Control > report-name from the navigation submenu, where report-name is any one of the Access Control reports.

Access Control Reports
Report Definition More information
Permission Modification Use the Permission Modification screen to search for and create a report on changes made to user permissions on selected log sources during a specified time interval. Permission Modification Reports
User Access Use the User Access screen to search for and generate a report on user activities in accessing resource (for example, service, file, directory, application) on selected log sources during a specified time interval. User Access Reports
User Authentication Use the User Authentication screen to search for and generate a report on who has authenticated on selected log sources during a specified time interval. User Authentication Reports
User Created/Deleted Use the User Created/Deleted screen to search for and generate a report on what users have created or deleted during a specified time interval. User Created/Deleted Reports
User Last Activity Use the User Last Activity screen to search for and generate a report on activity of users during a specified time interval. User Last Activity Reports
Windows Events Use the Windows Events screen to search for and generate a report on data about all log events from the Microsoft Windows operating systems. For example, the captured log events include, application, security, and system events. Windows Events Reports
Preparing a Real-time Report includes the common options that you specify for all Real-Time Reports.

Optional columns and filters can be sorted in ascending or descending order. Choose sort order using the drop-down menu. Optional filter operators are different for each Access Control report, and are explained in their respective sections.

For information on saving the generated report, see Formats for Saving a Generated Report.