Security Audit Log

A security audit log is a tamper resistant record of security sensitive occurrences that affect a system. It is used as a deterrent to prevent administrators maliciously or accidentally abusing their privileges when they otherwise have few restrictions. It can also be used to detect malicious activity (e.g. use of a compromised account).

Unlike the existing Event Log, the audit log is mainly aimed for administrators and their auditors.

Security Audit Log Settings

This page is about viewing or configuring the security audit log.

To view or edit Security Audit Log settings:

  1. Select Application Menu. The menu appears with available applications.
  2. Select Administration. The application displays at the landing page.
  3. In the Left Navigation Area, select Security. The Security expands to display list.
  4. Select Security Audit Log Settings. The existing Security Audit Log Settings display.
  5. Select Edit and configure the following fields as required:
    • Maximum audit log entries - Type the maximum number of audit log entries. There is a minimum value of 1 and a maximum value of 10,000
    • Minimum severity - Type the minimum message severity to log to the audit log
  6. Screenshot: View security audit log setting
     
  7. Select Save at the top right corner.

Viewing Security Audit Log

To view Security Audit log:

  1. Select Application Menu. The menu appears with available applications.
  2. Select Administration. The application displays at the landing page.
  3. In the Left Navigation Area, select Security. The Security expands to display list.
  4. Select Security Audit Log. The Security Audit Log displays.

Screenshot: View security audit log

  • The entries are sorted by Date Time by default with most recent events first
  • Custom formatting shows error entries in red and warnings in yellow
  • Customers can use the export feature to get a downloadable copy
  • Auditors can periodically download the audit log and clear it

Security Audit Log Messages

The following security events are captured in the security audit log. Messages include whether the event was successful, or failed, along with relevant details.

Record change events can be logged using Record Auditing, not security audit messages.

Security Event

Notes

User account creation
User account deletion
User account rename
User account expiryThis is logged at the first attempt to use the expired account, not the actual time of expiry.
User account password change
Change user account expiration
Change of user account status
Locked user accountLogged when a user has too many incorrect attempts.
Logon
LogoffNot all logoffs may be audited, since a user may not explicitly log off.
User role creation
User role deletion
User role rename
User role membership change
Application creation
Application deletion
Application deployment
Application publish
Password policy change
Access rule creation
Access rule enabling
Access rule query change
Access rule permission change
Access rule deletion
Tenant rollback