Permission Modification Reports
To search for and generate a report on activities related to modification of user permissions (for example, adding or deleting permissions) on selected log sources during a specified time interval, use the Permission Modification Real-Time Report.
In addition to setting the common report options in
Preparing a Real-time Report, you can select optional filter operators in the generated report.
Optional columns and filters can be sorted in ascending or descending order. Choose sort order using the drop-down menu. The optional filters are listed in the following table.
For information on saving the generated report, see Formats for Saving a Generated Report.
Option | Description |
---|---|
Source Device | Description of the device that sent these log messages |
User | User who is making the inquiry |
Action | Action taken |
Status | Status of the connection |
Source IP | IP address of the source host device |
Source Domain | Domain of the source host device |
Target User | User for whom inquiry is being made |
Target IP | IP address of the accessed Appliance |
Target Domain | Domain of the accessed Appliance |
Type | Type of connection |
Originating Host | The original host name where the event was originally created |
Subsystem | The subsystem of the host |
Originating IP | The original source IP address where the event was originally created |
Event Name | Name of the event |
Application Type | The type of application that generated the event |
Count | Number of connections |
Copyright © Cloud Software Group, Inc. All rights reserved.