Audit and logs
- Security logs - The console maintains a log of security events that occur when the following events occur: components are running and logs the user authentication, authorization, and permission events.
While logging a security event, the user key of the logged in user is used to identify the user in the log message. This user key is a random key that is generated by IBM PEM at the time of creating a user and is not a personal identification information of the user.
- Change history - Records the changes made, which can be used for auditing.
- Email audit - Audits outgoing emails.