Audit and logs

  • Security logs - The console maintains a log of security events that occur when the following events occur: components are running and logs the user authentication, authorization, and permission events.

    While logging a security event, the user key of the logged in user is used to identify the user in the log message. This user key is a random key that is generated by IBM PEM at the time of creating a user and is not a personal identification information of the user.

  • Change history - Records the changes made, which can be used for auditing.
  • Email audit - Audits outgoing emails.
For more information on configuring audit and log properties in setup.cfg, see Configuring the properties of Setup.cfg file.