Activity audit business4/16/2023 Each action isĭistinguished by the action and resources.type fields in the JSON record. The audit logs include records about the following categories of actions. The billing role associated with the billing information being sent. Performance Standards describe the nature of internal audit activities and provide criteria against which the performance of these services can be evaluated. The reason why the user logged out, such as a manual logout or a token expiring. Number of active authentication tokens for the user that logged in. User information provided by the external system that was used to log in. Login used in the Grafana authentication form. The additionalData field can contain the following information: Field name IP address that the request was made from.Īgent through which the request was made.Ĭurrent version of Grafana when this log is created.Īdditional information that can be provided about the request. The type of the resource that was logged: alert, alert-notification, annotation, api-key, auth-token, dashboard, datasource, folder, org, panel, playlist, report, team, user, or version. This field can be null for non-resource actions such as login or logout. Information about the resources that the request action affected. If the request action was successful, success. For example, create, update, or manage-permissions. If an anonymous user made the request, true. ID of the Grafana API key used to make the request. has a set of properties that provides information about the activity. Name of the Grafana user that made the request. Azure Active Directory (Azure AD) audit logs collect all traceable activities within your Azure AD tenant. The audit log service is business-group aware, which means you see only logs that. For example, you can: Examine potential security risks Analyze your. ID of the Grafana user that made the request.Ĭurrent organization of the user that made the request.Ĭurrent role of the user that made the request. As an administrator, you can view reports and log events in the Google Admin console to review activity in your organization. Either one of the UserID or ApiKeyID fields will contain content if isAnonymous=false. Do you know what are your maximum tolerable outage and critical activities are in the event of a. Do you know what resources you need as a minimum to recover your critical business functions 7. Information about the user that made the request. Do you know the potential financial and non-financial impact of a business interruption involving major human, physical and technology loss 6. The date and time the request was made, in coordinated universal time (UTC) using the RFC3339 format. The fields followed by * are always available, the others depend on the type of action logged.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |