1. | Click Security audit. |
2. | Sub-task: Analyze global security history. |
2.1 | On the Security history tab, analyze all events that are logged on the security configuration. |
2.2 | An event as logged in the security history, can result from a security request. Once approved, a security request is implemented automatically. This results in a change event on the security configuration. If an event results from a security request, the related security request is shown in the Security request reference field. You can view the related security request history. |
  | On the Security history tab, in the list, find and select the desired security-request-related event. |
2.3 | Click Open security request history. |
2.4 | Close the page. |
3. | Sub-task: Analyze role security history. |
3.1 | Click the Role history tab. |
3.2 | On the upper pane, all available security roles are shown. |
3.3 | In the list, find and select the desired record. |
3.4 | On the lower pane, analyze all events that are logged on the security configuration of the selected role. |
4. | Sub-task: Analyze user security history. |
4.1 | Click the User history tab. |
4.2 | On the upper pane, all available users are shown. |
4.3 | In the list, find and select the desired record. |
4.4 | On the lower pane, analyze all events that are logged on the security configuration of the selected user. |
You can analyze the changes made to the security configuration of a specific user and/or role during a specific time period. To do so, on the Security audit workspace, in the Links section, click Security user log. Use the Date range, User ID, and Roles fields to filter the logged security changes. Click Collect and refresh data to apply the defined filters.
Related to | Notes |
---|---|
Audit security history |
  |