You can use the security audit report to analyze permissions and permission changes that are made to recorded elements during a specific period.
| 1. | Click Security audit. |
| 2. | Click Print audit report. |
| 3. | In the Scenario field, enter or select a value. |
| 4. | In the Data security field, enter or select a value. |
| 5. | You can define the period for which you want to analyze the permissions and permission changes. |
|   | In the From field, enter a date. |
| 6. | In the To field, enter a date. |
| 7. | You can select several users. To do so, in the Users field, open the look-up, and click in front of the desired user records. So, the check mark is shown. Then click Select. |
|   | In the Users field, enter or select a value. |
|   |
Note: You can also enter a range of users. To do so, select the first and last user of the range and click Select. In the user field, replace the comma (,) with a dash (-). |
| 8. | You can sort the results in the report by: - User - The data in the report is sorted by user. For each user in the selection, the related permissions and changes are shown. - Securable object - The data in the report is sorted by the securable objects, tables, or fields. Just what is applicable due to the selected task recording or table security recording. - Data - The data in the report is sorted chronologically by date. - Organization - The data in the report is sorted by the legal entities to which the users in the selection had access in the defined period. |
|   | In the Sort order field, select an option. |
| 9. | You can change the destination of the report. |
|   | Click Change. |
| 10. | Make the selections as desired. |
|   | Click OK. |
| 11. | Click OK. |
| Related to | Notes |
|---|---|
|
Manage data security |
  |
|
Manage data security |
  |
|
Audit security history |
  |