You can use the security audit report to analyze permissions and permission changes that are made to recorded elements during a specific period.
|1.||Click Security audit.|
|2.||Click Print audit report.|
|3.||In the Scenario field, enter or select a value.|
|4.||In the Data security field, enter or select a value.|
|5.||You can define the period for which you want to analyze the permissions and permission changes.|
| ||In the From field, enter a date.|
|6.||In the To field, enter a date.|
|7.||You can select several users. To do so, in the Users field, open the look-up, and click in front of the desired user records. So, the check mark is shown. Then click Select.|
| ||In the Users field, enter or select a value.|
Note: You can also enter a range of users. To do so, select the first and last user of the range and click Select. In the user field, replace the comma (,) with a dash (-).
|8.||You can sort the results in the report by:
- User - The data in the report is sorted by user. For each user in the selection, the related permissions and changes are shown.
- Securable object - The data in the report is sorted by the securable objects, tables, or fields. Just what is applicable due to the selected task recording or table security recording.
- Data - The data in the report is sorted chronologically by date.
- Organization - The data in the report is sorted by the legal entities to which the users in the selection had access in the defined period.
| ||In the Sort order field, select an option.|
|9.||You can change the destination of the report.|
| ||Click Change.|
|10.||Make the selections as desired.|
| ||Click OK.|