Security Audit |
Previous Top Next |
Menu Navigation
Activities ... Human Resources ... User Security
Audit File ... View the Audit File
Audit File ... Reset the Audit File
About Security Audit
The Security Audit feature allows you to monitor a user's activity within the system. From login to logout, every move can be traced and recorded. If security breaches are suspected, this technique will trace the steps that you want it to.
This feature may put a heavy load on the workstation and/or network due to the amount of data that needs to be recorded. Therefore, it is suggested to use it when truly needed, and turn it off afterwards. |
In this Topic
Field by Field Help - Audit List
Related Topics
17.1 Security Setup
17.2 Users
Field by Field Help - Audit List
Print Audit File
Click this button to get a report of the audit file.
Select Filter For Report Based On Tab Selected
Click this button to get a lookup list of the possible filter values for the audit file. These values will vary depending on the tab selected on the bottom.
Date/Time
Displays the date and time that the audit record was created.
REQ
Displays whether the access was allowed (ACY) or denied (ACN).
User Name/Group Name
Displays the name of the user that attempted access into a resource and the group to which they belong, if any.
Resource Name/Comments
Displays the name of the specific resource the user tried to access and whether access was allowed or denied.
Seeing access denied messages scattered throughout the log file does not necessarily mean that the user is trying to do something they are not allowed. It is merely stating that something that they are doing contains potential resources that they do not have access to. If there is one resource that seems to be accessed over and over, but is denied each time, then there might be cause for concern. |
The audit file may grow to a great size quickly, especially if all of auditing is turned on. From time to time, you may wish to purge parts of the file and start over. To do so, click on Audit File...Reset the Audit File. You will then be asked to select a date such that the records before that date will be purged. Choose the date that is right for you and then click OK to purge. Be aware that purging may take a considerable length of time, depending on the amount of data involved.
Q01. | I have very fast machines and connections. Should I turn auditing on all of the time? |
A01. | Not necessarily. Auditing is best used only when problems or breaches are suspected. If auditing is turned on all of the time, then most of the processing time spent by the computers will be devoted to the auditing process and the writing of audit data. It is better to turn on auditing on an as-needed basis. |
Q02. | I don't see my question here. Where else can I get information? |
A02. | Visit our website's Technical Support section. |
|
|
© 2015 - Intellisoft Solutions, Inc. All rights reserved. | |
Other Related Links | |
Business Software | Cellular Software | Pager Software | Business Management Software |