Obtaining an audit log of objects

Audit logs are available for IBM® Sterling Control Center Monitor, Sterling Connect:Direct®, and Sterling Secure Proxy objects.

You can get an audit log for IBM Sterling Control Center Monitor objects that have been created, updated, and deleted. You can get an audit log for Sterling Connect:Direct objects, on monitored Sterling Connect:Direct servers, that have been created, updated, and deleted. You can get an audit log report for Sterling Secure Proxy objects, on monitored Sterling Secure Proxy servers, that have been created, updated, and deleted.

Important: When you right-click a server in the node tree and select Audit Log, the filter for the audit log is set to OBJECT TYPE EQUALS Server, and OBJECT ID matches <selected server name>. This filter shows changes made to the server definition in IBM Sterling Control Center Monitor, such as the Monitor Rest Time server property. To see changes to Sterling Secure Proxy objects, you need to change the audit log filter.
You can get audit logs for the following types of objects:
  • IBM Sterling Control Center Monitor
    • Actions
    • Report schedules
    • Calendars
    • Roles
    • Rules
    • Rules schedules
    • Data Visibility Groups (DVGs)
    • Service Level Criteria (SLCs)
    • Users
    • Email lists
    • Metadata actions
    • Metadata rules
    • Servers
  • Sterling Connect:Direct
    • Secure+ cipher suites
    • Functional authorities
    • Secure+ key certificates
    • Initialization parameters
    • Secure+ nodes
    • Secure+ trusted certificates
    • Netmap communication paths
    • User proxies
    • Netmap node entries
    • Netmap modes
  • Sterling Secure Proxy
    • Accepters
    • Sterling Connect:Direct, FTP, HTTP, SFTP, and PeSIT adapters
    • Configuration Manager users
    • External authentication servers
    • Engines
    • Keystores
    • Sterling Connect:Direct, FTP, HTTP, SFTP, and PeSIT netmaps
    • Password policies
    • Sterling Connect:Direct, FTP, HTTP, SFTP, and PeSIT policies
    • Single signons
    • Step injections
    • System globals
    • System SSL information
    • Perimeter servers
    • User stores

To get an audit log of an object:

  1. Display the listing. For example, to display the listing of rules, click Manage > Rules and Actions > Rules.
  2. Right-click the listing and select Audit Log.