You can use the security audit report to analyze permissions and permission changes that are made to recorded elements during a specific period.

You can create the report based on:
  • Scenario - The report shows any permission changes to the securable objects as made in the selected scenario.
  • Data security record - The report shows any permission changes to the tables and table fields as made in the selected data security record.
You can only create this report if Security and compliance IT audit is initialized.


Standard procedure

1. Click Security audit.
2. Click Print audit report.
3. In the Scenario field, enter or select a value.
4. In the Data security field, enter or select a value.
5. You can define the period for which you want to analyze the permissions and permission changes.
  In the From field, enter a date.
6. In the To field, enter a date.
7. You can select several users. To do so, in the Users field, open the look-up, and click in front of the desired user records. So, the check mark is shown. Then click Select.
  In the Users field, enter or select a value.
 

Note: You can also enter a range of users. To do so, select the first and last user of the range and click Select. In the user field, replace the comma (,) with a dash (-).

8. You can sort the results in the report by:
- User - The data in the report is sorted by user. For each user in the selection, the related permissions and changes are shown.
- Securable object - The data in the report is sorted by the securable objects, tables, or fields. Just what is applicable due to the selected task recording or table security recording.
- Data - The data in the report is sorted chronologically by date.
- Organization - The data in the report is sorted by the legal entities to which the users in the selection had access in the defined period.
  In the Sort order field, select an option.
9. You can change the destination of the report.
  Click Change.
10. Make the selections as desired.
  Click OK.
11. Click OK.

Provide feedback