Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Audit Trail Report

The Audit Trail report is a standardized report generated in Network Director. It shows a history of users accessing the system, modifications to applications, and network management activities for a specific period of time. The report is defined and generated from the Report mode in Network Director.

There are two portions of the report: a report header and the report body. The contents of the report header are shown in Table 1.

Table 1: Audit Trail Report Header Information




The type of report; In this case, the Audit Trail report.

Generated On:

The date and time the report ran. The date format is: [Day of the Month] [Month] [Year]. The time format follows the Coordinated Universal Time (UTC). For example: 07 December 2012 11:35 PM PST.

Generated By:

The username of the user that generated the report.

Report Name

The name of the report assigned when the report was created.


The report is generated from this view and node in the network. Perspective can be Logical view, Location view, or Device view of the network. Node represents the selected object upon which the report is based.

Report Filters

The period of time specified for data collection.

The body of the report comprises the Audit Logs by Task Type chart, the Audit Logs by User chart, and a Audit Detail table.

The Audit Logs by Task Type is a bar chart that lists all of the user and system activities over the specified time period for all users.

The Audit Logs by Users is a pie chart that graphically represents all the active users in a specified time period.

The fields in the report body table are shown in Table 2.

Table 2: Audit Trail Report Fields



User Name

The userid of the individual associated with the activity.

User IP

The IP address of the client.


A short summary of the activity, such as Backup or Login.


The description of the system activity being logged. Examples of common logging activities include logging in and out of the system, modifying application settings, creating SMTP or SCP servers, or database backups.


The result of the system activity: whether it is successful or not. Regularly scheduled events, such as backups, show as recurring.

Job ID

The system generated identification for applicable tasks.


The date and time of the activity. The date is shown in the format: [Day of the Month] [Month] [Year], while the time is shown in standard 12-hour clock format.