Permission Modification Reports
To search for and generate a report on activities related to modification of user permissions (for example, adding or deleting permissions) on selected log sources during a specified time interval, use the Permission Modification Real-Time Report.
In addition to setting the common report options in
Preparing a Real-time Report, you can select optional filter operators in the generated report.
Optional columns and filters can be sorted in ascending or descending order. Choose sort order using the list. The optional filters are listed in the following table.
For information on saving the generated report, see Formats for Saving a Generated Report.
Option | Description |
---|---|
Source Device | Description of the device that sent these log messages |
User | User who is making the inquiry |
Action | Action taken |
Status | Status of the connection |
Source IP | IP address of the source host device |
Source Domain | Domain of the source host device |
Target User | User for whom inquiry is being made |
Target IP | IP address of the accessed Appliance |
Target Domain | Domain of the accessed Appliance |
Type | Type of connection |
Originating Host | The original host name where the event was originally created |
Subsystem | The subsystem of the host |
Originating IP | The original source IP address where the event was originally created |
Event Name | Name of the event |
Application Type | The type of application that generated the event |
Count | Number of connections |
Copyright © 2020. Cloud Software Group, Inc. All Rights Reserved.