When you have set up and activated the tracking of sensitive data changes, changes to sensitive data are logged.

Who can view the sensitive data log is defined on the related sensitive data change tracking users setup.

If on the sensitive data setup:

  • No users are defined, all users with access to the Sensitive data log page, can view all logged changes.
  • Users are defined, only these users can view the logged changes for the sensitive data change tracking setup.

On the Sensitive data log page, in the:

  • Upper grid, view the sensitive data change events. Each time sensitive data is changed, an event is logged by table, user, sensitive data setup, and date/time.
  • Details grid, for the selected sensitive data change event, view the data changes to one or more fields with sensitive data.


Standard procedure

1. Go to Security and compliance > Inquiries > Sensitive data log.
2. Sub-task: Filter the sensitive data log.
  2.1 In the From date field, enter a date.
  2.2 In the To date field, enter a date.
  2.3 In the User ID field, enter or select a value.
  2.4 In the Table name field, enter or select a value.
3. Sub-task: Open source record.
  3.1 You can open the source record of a logged event.
  In the logged events list, find and select the desired event.
  3.2 Click Open source record.
 

Note: If the related record is deleted or cannot be opened, an error message is shown.

4. Sub-task: Create report.
  4.1 You can create a report with logged sensitive data events. The report is in Microsoft Excel format.
  Click Generate report.
  4.2 Select the sensitive data setups which logged events must be included in the report.
  In the Sensitive data setup name field, enter or select a value.
  4.3 use the From date and To date to define the period for which logged events must be included in the report.
  In the From date field, enter a date.
  4.4 In the To date field, enter a date.
  4.5 You can create reports in a batch in a recurring batch job.
  Select Yes in the Batch processing field and fill in the fields as desired.
  4.6 Click Recurrence and fill in the fields as desired.
  4.7 Click OK.
  4.8 Click OK.
 

Note:

To download a created report:

  1. Open the Security and compliance file share workspace.
  2. Click the Logs tab.
  3. Select the desired 'Sensitive data log' type file.
  4. Click Download.

Provide feedback