Use the Audit option to search for logged versions of security-related events, data read access, and configuration changes. The security audit logs include events that impact the confidentiality, integrity, and availability of the system, for example, failed logins and authorization checks, and changes in critical system parameters. The data read access audit logs include all attempts to access sensitive personal data or personally identifiable information (PII). The configuration change audit logs include changes to any configuration data, such as creating a batch report or removing a limit set.
Click the time stamp to view the details of an audit record.