Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Logged Actions

 

Actions are logged for components.

The following table lists the categories and corresponding actions that are logged.

Table 1: Logged Actions

Category

Action

Policy Monitor

Create a question.

Edit a question.

Delete a question.

Submit a question manually.

Submit a question automatically.

Approve results.

Revoke results approval.

Topology Model

Create a topology model.

Edit a topology model.

Delete a topology model.

Topology

Save layout.

Create a topology saved search.

Edit a topology saved search

Delete a topology saved search

Placing an IPS.

Configuration Monitor

Create a log source mapping

Edit a log source mapping

Delete a log source mapping

Simulations

Create a simulation.

Edit a simulation.

Delete a simulation.

Manually run a simulation.

Automatically run a simulation.

Approve simulation results.

Revoke simulation results.

Configuration Source Management

Successfully authenticate for the first time on a session.

Add a device.

Remove a device.

Edit the IP address or adapter for a device.

Save a credential configuration.

Delete a credential configuration.

Save a protocol configuration.

Remove a protocol configuration.

Create a schedule for a backup job.

Delete a schedule for a backup job.

Edit a backup job.

Add a backup job.

Delete a backup job.

Run a scheduled backup job.

Complete a scheduled job whether the job is successful or has failed.

After a backup job has completed processing and the configuration was persisted, no changes discovered.

After a backup job has completed processing and the configuration was persisted, changes were discovered.

After a backup job has completed processing and the configuration was persisted, unpersisted changes were discovered.

After a backup job has completed processing and the configuration that was previously persisted no longer resides on the device.

Adapter operation attempt has begun, which includes protocols and credentials.

Adapter operation attempt has been successful, including the protocols and credentials.