Audit Reports
The Audit Reports screen records manual changes made to sensitive system configuration areas. It provides administrators with a log of who changed what and when, supporting compliance and troubleshooting requirements.
What is Audited
The following types of changes are recorded in the audit log:
| Area | Examples of audited actions |
|---|---|
| System Keys | Changes to global configuration settings |
| Users | Account creation, deletion, locking, unlocking, enabling, disabling, password changes |
| Groups | Group creation, deletion, changes to group permissions |
| Group Membership | Users added to or removed from groups |
Each audit record captures:
- The type of action performed
- The target record (e.g. the user ID or system key that was changed)
- The user who performed the action
- The date and time of the action
Viewing the Audit Log
The Audit Reports screen allows administrators to browse and filter the audit history. The log is read-only — entries cannot be edited or deleted.
Database Table
Audit records are stored in SYS_AUDIT_PERMISSIONS.
See also: Users, Groups, Permissions, System Keys