Platform Secure Firewall Threat Defense Virtual
Activity Manage

Logging the Events

As an administrator, you have access to a log of the activities within the organization. The log records events such as changes to the role-based access control configuration, user login or logout, and so on.

By collecting and analyzing these logs, you can—

  • Proactively monitor: Track the access and configuration changes in real-time to quickly identify potential issues or unauthorized changes.

  • Investigate security incidents: Examine what changes were made in the organization, by whom, and when, to understand and respond to security incidents effectively.

  • Maintain accountability: Ensure that users and administrators are accountable for their actions within the system.

  • Manage role-based access control changes: Ensure that the modifications to the role-based access control system do not impact the security or functionality of the system.

The system logs the following types of events.

  • Role management events such as assigning or removal of roles to users and groups.

  • Group management events such as adding or removing users from a group, creating or deleting groups, and mapping groups.

  • User activity events such as login, logout, password resets, multifactor authentication (MFA) changes, adding or removing a user from the organization, and so on.