Auditing

Security ► Auditing

You can produce a report that shows any authentication attempts, user additions, or other events.

Reviewing the security log

  1. Open Security ► Auditing.
    The report lists security events.
  2. Set filters to narrow your search.
    • To narrow the time range, enter new values in the From date and To date fields, and then click Apply.
      You can edit each value directly or select a date from a pop-up calendar.
    • To limit the number of records displayed, type the maximum number in Max results returned and then click Apply.
    • To report on changes to the system user account (used to facilitate communications between integrated components), select Show system user audit events.
  3. To search for records that match a string, type the search string in Filter and then click OK.

Setting up rules for purging records

  1. Open Security ► Auditing.
    The report lists security events.
  2. Click Audit purge configuration to open the Audit purge configuration screen.
  3. Review the settings and adjust them as needed.
    • Maximum number of records (Threshold)
      If this number of records is exceeded, a purge is triggered.
      Default: 100000
    • Maximum number of records to keep in DB
      If a purge is triggered (see Maximum number of records), all records above this number are deleted.
      Default: 80000
    • Maximum lifetime of records (in days, hours, or minutes)
      If a purge is triggered (see Maximum number of records), all records older than this setting are deleted.
      Be sure to select Days, Hours, or Minutes.
      Default: 90 days
    • Purge period (in hours or minutes)
      Be sure to select Hours or Minutes.
      Default: 4 hours
  4. Click Save.

Exporting the audit log to a .CSV file

  1. Open Security ► Auditing
    The report lists security events.
  2. Clean up the log by purging it as needed.
    You don't want to export a lot of unnecessary records.
  3. Click Export audit log to create a .CSV file of the audit.