Logged Actions
SUMMARY Actions are logged for components.
The following table lists the categories and corresponding actions that are logged.
| Category | Action |
|---|---|
| Policy Monitor | Create a question. |
| Edit a question. | |
| Delete a question. | |
| Submit a question manually. | |
| Submit a question automatically. | |
| Approve results. | |
| Revoke results approval. | |
| Topology Model | Create a topology model. |
| Edit a topology model. | |
| Delete a topology model. | |
| Topology | Save layout. |
| Create a topology saved search. | |
| Edit a topology saved search. | |
| Delete a topology saved search. | |
| Placing an IPS. | |
| Configuration Monitor | Create a log source mapping. |
| Edit a log source mapping. | |
| Delete a log source mapping. | |
| Simulations | Create a simulation. |
| Edit a simulation. | |
| Delete a simulation. | |
| Manually run a simulation. | |
| Automatically run a simulation. | |
| Approve simulation results. | |
| Revoke simulation results. | |
| Configuration Source Management | Successfully authenticate for the first time on a session. |
| Add a device. | |
| Remove a device. | |
| Edit the IP address or adapter for a device. | |
| Save a credential configuration. | |
| Delete a credential configuration. | |
| Save a protocol configuration. | |
| Remove a protocol configuration. | |
| Create a schedule for a backup job. | |
| Delete a schedule for a backup job. | |
| Edit a backup job. | |
| Add a backup job. | |
| Delete a backup job. | |
| Run a scheduled backup job. | |
| Complete a scheduled job whether the job is successful or unsuccessful. | |
| After a backup job is completed processing and the configuration was persisted, no changes discovered. | |
| After a backup job is completed processing and the configuration was persisted, changes were discovered. | |
| After a backup job is completed processing and the configuration was persisted, unpersisted changes were discovered. | |
| After a backup job is completed processing and the configuration that was previously persisted no longer lives on the device. | |
| Adapter operation attempt began, which includes protocols and credentials. | |
| Adapter operation attempt was successful, including the protocols and credentials. |