Show TOC

Read Access Logging Entries in the Security Audit LogLocate this document in the navigation structure

The Security Audit Log records activities in the system that are considered important for auditing and security purposes. This includes the following actions in Read Access Logging (RAL):

  • Viewing the read access log
  • Changing any of the configuration (creating, editing or deleting logging purposes, recordings, or any other configuration settings)

When these actions are performed, corresponding entries are recorded in the Security Audit Log, including the user and time.

The following codes are used in the Message text field for RAL-specific log entries:

Actions Description
C Create
R Read
U Update
D Delete
Types Description
P Logging purpose
D Log domain
R Recording
C Configuration
B User exclusion list
S Enabling in client
L Read access log

Example

Message text Description
RAL Log Access: Action: R The read access log was viewed.
RAL Configuration Access: Action: U, Type C, Banking1 The Banking1 configuration was changed.