Actions are logged for components.
The following table lists the categories and corresponding actions that are logged.
Table 1: Logged Actions
Create a question.
Edit a question.
Delete a question.
Submit a question manually.
Submit a question automatically.
Revoke results approval.
Create a topology model.
Edit a topology model.
Delete a topology model.
Create a topology saved search.
Edit a topology saved search
Delete a topology saved search
Placing an IPS.
Create a log source mapping
Edit a log source mapping
Delete a log source mapping
Create a simulation.
Edit a simulation.
Delete a simulation.
Manually run a simulation.
Automatically run a simulation.
Approve simulation results.
Revoke simulation results.
Configuration Source Management
Successfully authenticate for the first time on a session.
Add a device.
Remove a device.
Edit the IP address or adapter for a device.
Save a credential configuration.
Delete a credential configuration.
Save a protocol configuration.
Remove a protocol configuration.
Create a schedule for a backup job.
Delete a schedule for a backup job.
Edit a backup job.
Add a backup job.
Delete a backup job.
Run a scheduled backup job.
Complete a scheduled job whether the job is successful or has failed.
After a backup job has completed processing and the configuration was persisted, no changes discovered.
After a backup job has completed processing and the configuration was persisted, changes were discovered.
After a backup job has completed processing and the configuration was persisted, unpersisted changes were discovered.
After a backup job has completed processing and the configuration that was previously persisted no longer resides on the device.
Adapter operation attempt has begun, which includes protocols and credentials.
Adapter operation attempt has been successful, including the protocols and credentials.