Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Logged Actions

SUMMARY Actions are logged for components.

The following table lists the categories and corresponding actions that are logged.

Table 1: Logged Actions
Category Action
Policy Monitor Create a question.
Edit a question.
Delete a question.
Submit a question manually.
Submit a question automatically.
Approve results.
Revoke results approval.
Topology Model Create a topology model.
Edit a topology model.
Delete a topology model.
Topology Save layout.
Create a topology saved search.
Edit a topology saved search.
Delete a topology saved search.
Placing an IPS.
Configuration Monitor Create a log source mapping.
Edit a log source mapping.
Delete a log source mapping.
Simulations Create a simulation.
Edit a simulation.
Delete a simulation.
Manually run a simulation.
Automatically run a simulation.
Approve simulation results.
Revoke simulation results.
Configuration Source Management Successfully authenticate for the first time on a session.
Add a device.
Remove a device.
Edit the IP address or adapter for a device.
Save a credential configuration.
Delete a credential configuration.
Save a protocol configuration.
Remove a protocol configuration.
Create a schedule for a backup job.
Delete a schedule for a backup job.
Edit a backup job.
Add a backup job.
Delete a backup job.
Run a scheduled backup job.
Complete a scheduled job whether the job is successful or unsuccessful.
After a backup job is completed processing and the configuration was persisted, no changes discovered.
After a backup job is completed processing and the configuration was persisted, changes were discovered.
After a backup job is completed processing and the configuration was persisted, unpersisted changes were discovered.
After a backup job is completed processing and the configuration that was previously persisted no longer lives on the device.
Adapter operation attempt began, which includes protocols and credentials.
Adapter operation attempt was successful, including the protocols and credentials.