Logged Actions
SUMMARY Actions are logged for components.
The following table lists the categories and corresponding actions that are logged.
Category | Action |
---|---|
Policy Monitor | Create a question. |
Edit a question. | |
Delete a question. | |
Submit a question manually. | |
Submit a question automatically. | |
Approve results. | |
Revoke results approval. | |
Topology Model | Create a topology model. |
Edit a topology model. | |
Delete a topology model. | |
Topology | Save layout. |
Create a topology saved search. | |
Edit a topology saved search. | |
Delete a topology saved search. | |
Placing an IPS. | |
Configuration Monitor | Create a log source mapping. |
Edit a log source mapping. | |
Delete a log source mapping. | |
Simulations | Create a simulation. |
Edit a simulation. | |
Delete a simulation. | |
Manually run a simulation. | |
Automatically run a simulation. | |
Approve simulation results. | |
Revoke simulation results. | |
Configuration Source Management | Successfully authenticate for the first time on a session. |
Add a device. | |
Remove a device. | |
Edit the IP address or adapter for a device. | |
Save a credential configuration. | |
Delete a credential configuration. | |
Save a protocol configuration. | |
Remove a protocol configuration. | |
Create a schedule for a backup job. | |
Delete a schedule for a backup job. | |
Edit a backup job. | |
Add a backup job. | |
Delete a backup job. | |
Run a scheduled backup job. | |
Complete a scheduled job whether the job is successful or unsuccessful. | |
After a backup job is completed processing and the configuration was persisted, no changes discovered. | |
After a backup job is completed processing and the configuration was persisted, changes were discovered. | |
After a backup job is completed processing and the configuration was persisted, unpersisted changes were discovered. | |
After a backup job is completed processing and the configuration that was previously persisted no longer lives on the device. | |
Adapter operation attempt began, which includes protocols and credentials. | |
Adapter operation attempt was successful, including the protocols and credentials. |