When you have set up and activated the tracking of sensitive data changes, changes to sensitive data are logged.
Who can view the sensitive data log is defined on the related sensitive data change tracking users setup.
If on the sensitive data setup:
On the Sensitive data log page, in the:
1. | Go to Security and compliance > Inquiries > Sensitive data log. |
2. | Sub-task: Filter the sensitive data log. |
2.1 | In the From date field, enter a date. |
2.2 | In the To date field, enter a date. |
2.3 | In the User ID field, enter or select a value. |
2.4 | In the Table name field, enter or select a value. |
3. | Sub-task: Open source record. |
3.1 | You can open the source record of a logged event. |
  | In the logged events list, find and select the desired event. |
3.2 | Click Open source record. |
  |
Note: If the related record is deleted or cannot be opened, an error message is shown. |
4. | Sub-task: Create report. |
4.1 | You can create a report with logged sensitive data events. The report is in Microsoft Excel format. |
  | Click Generate report. |
4.2 | Select the sensitive data setups which logged events must be included in the report. |
  | In the Sensitive data setup name field, enter or select a value. |
4.3 | use the From date and To date to define the period for which logged events must be included in the report. |
  | In the From date field, enter a date. |
4.4 | In the To date field, enter a date. |
4.5 | You can create reports in a batch in a recurring batch job. |
  | Select Yes in the Batch processing field and fill in the fields as desired. |
4.6 | Click Recurrence and fill in the fields as desired. |
4.7 | Click OK. |
4.8 | Click OK. |
  |
Note: To download a created report:
|
Related to | Notes |
---|---|
Track changes to sensitive data |
  |