IBM Support

How to identify what User modified a Group in IBM Security Guardium appliances?

How To


Summary

In IBM Security Guardium™, it is possible to group together similar data objects for later use them in different tasks, like when creating a Query/Report, a Policy, or Data Classification tasks definitions, to mention a few.

Given that working with groups is a very common task as a part of the internal Guardium™ appliance operations, the administrators may want to keep track of any changes made to the different groups created in order to ensure consistency and proper setup for the scope of use a given group was created for.

Also, it may be important to determine who modified a group (adding members and groups, removing them, renaming them, etc.) and when, in the event of trying to identify potential problems in the execution of some tasks performed inside the appliance.

Document Location

Worldwide

[{"Type":"MASTER","Line of Business":{"code":"LOB76","label":"Data Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"ARM Category":[{"code":"a8m0z0000000AqmAAE","label":"AUDIT"},{"code":"a8m0z0000000AqcAAE","label":"GUI"},{"code":"a8m0z0000001erNAAQ","label":"REPORTS"}],"ARM Case Number":"","Platform":[{"code":"PF004","label":"Appliance"}],"Version":"All Versions"}]

Log InLog in to view more of this document

This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.

Document Information

Modified date:
25 November 2021

UID

ibm16116932