Access Control Reports

To search for and generate reports on the number of times a selected log source executes an authentication rule, use Access Control reports.

The submenu that appears when you click Reports > Access Control, lists the reports that are available for each log source.

Accessing the Access Control Reports

Choose Reports > Access Control > report-name from the navigation submenu, where report-name is any one of the Access Control reports.

Access Control Reports
Report Definition More information
Permission Modification Use the Permission Modification screen to search for and create a report on changes made to user permissions on selected log sources during a specified time interval. Permission Modification Reports
User Access Use the User Access screen to search for and generate a report on user activities in accessing resource (for example, service, file, directory, application) on selected log sources during a specified time interval. User Access Reports
User Authentication Use the User Authentication screen to search for and generate a report on who has authenticated on selected log sources during a specified time interval. User Authentication Reports
User Created/Deleted Use the User Created/Deleted screen to search for and generate a report on what users have created or deleted during a specified time interval. User Created/Deleted Reports
User Last Activity Use the User Last Activity screen to search for and generate a report on activity of users during a specified time interval. User Last Activity Reports
Windows Events Use the Windows Events screen to search for and generate a report on data about all log events from the Microsoft Windows operating systems. For example, the captured log events include, application, security, and system events. Windows Events Reports
Preparing a Real-time Report includes the common options that you specify for all Real-Time Reports.

Optional columns and filters can be sorted in ascending or descending order. Choose sort order using the list. Optional filter operators are different for each Access Control report, and are explained in their respective sections.

For information on saving the generated report, see Formats for Saving a Generated Report.