Auditing user accounts, datastores, security policies, and general events

You can audit user accounts, datastores, security policies, and general events in the Access Manager perspective of Management Console. Collecting data generated by user activities is very important for analyzing the security of information, verifying system integrity, and detecting signs of suspicious behavior.

By generating reports that contain this type of information, you can systematically examine user activities and identify any attempts to breach the security of your replication configuration. When audit logging is enabled, Access Server keeps track of significant activities and records them into an audit log file. You can archive audit log files and generate audit trail reports for a specified period of time from the current audit log, or from an archived log file. Two types of reports can be generated from an audit log: audit trail and security log. You can save audit trail reports as HTML files, and display or print them through a web browser.

Note: To be able to work in the Access Manager perspective, you must be a system administrator that has the privilege to manage datastores and user accounts.