Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Log Changes to Secret Data

The following are examples of audit logs of events that change the secret data. Whenever there is a change in the configuration example, the syslog event should capture the below logs:

Everytime a configuration is updated or changed, the syslog should capture these logs: