To optimize licenses, you can monitor the accessed securable objects for each user. You can compare the accessed securable objects with the allocated securable objects. To limit license costs, you can remove permissions for not-accessed securable objects.
Name | Responsible | Description |
---|---|---|
Monitor user accessed securable objects |
Security administrator |
For each user, you can monitor the accessed securable objects. You can compare the accessed securable objects with the allocated securable objects. To limit license costs, you can remove permissions for not-accessed securable objects. |
Clean up user accessed entry points log |
Security administrator |
If continuous user logging is enabled, each time a user accesses an entry point, this is logged in the User continuous log. You can clean up the User continuous log manually or in a recurring mode. |