Security Settings Reports

To search for and generate a report containing logs of all the events related to creation, deletion, modification of user/group/roles use the Security Settings Real-Time Report.

Menu path: Reports > Enterprise Content Management > Security Settings

In addition to setting the common report options in Preparing a Real-time Report, you can select optional filter operators in the generated report.

You can select to view various options in ascending or descending order. Choose the sort order by using the drop-down menu. The default is to display the Source Device, Source Device IP, Performer Name, Parent Name, Event, and Count.

For information on saving the generated report, see Formats for Saving a Generated Report.

Security Settings Report - Optional Filter Operators
Option Description
Source Device Device that sent these log messages
Source Device IP IP address of the device that exercised the policy
Performer Name Name of the performer
Parent Name Name of the parent
Object Name Name of the object that was acted on
Event The type of event
Event Name Name of the event
Source Name Name of the source host device
Count Number of attacks

For information on saving the generated report, see Formats for Saving a Generated Report.