You can use the security audit report to analyze permissions and permission changes that are made to recorded elements during a specific period.
1. | Click Security audit. |
2. | Click Print audit report. |
3. | In the Scenario field, enter or select a value. |
4. | In the Data security field, enter or select a value. |
5. | You can define the period for which you want to analyze the permissions and permission changes. |
  | In the From field, enter a date. |
6. | In the To field, enter a date. |
7. | You can select several users. To do so, in the Users field, open the look-up, and click in front of the desired user records. So, the check mark is shown. Then click Select. |
  | In the Users field, enter or select a value. |
  |
Note: You can also enter a range of users. To do so, select the first and last user of the range and click Select. In the user field, replace the comma (,) with a dash (-). |
8. | You can sort the results in the report by: - User - The data in the report is sorted by user. For each user in the selection, the related permissions and changes are shown. - Securable object - The data in the report is sorted by the securable objects, tables, or fields. Just what is applicable due to the selected task recording or table security recording. - Data - The data in the report is sorted chronologically by date. - Organization - The data in the report is sorted by the legal entities to which the users in the selection had access in the defined period. |
  | In the Sort order field, select an option. |
9. | You can change the destination of the report. |
  | Click Change. |
10. | Make the selections as desired. |
  | Click OK. |
11. | Click OK. |
Related to | Notes |
---|---|
Manage data security |
  |
Manage data security |
  |
Audit security history |
  |