The audit log functionality chronologically records all the security relevant data performed on the system.
The audit log functionality chronologically records all the security relevant data performed on the system. The recorded data includes:
- User Management Tracking: Create, suspend, activate and delete users
- User Access Tracking: This includes time of login by the user, files accessed, search activities, downloads, video views, shared files, and deleted items.
- Device activity: devices that were added for backup and restore activities, pausing and resuming of backup, date of last backup, storage alerts, details of suspended, deleted or archived devices are recorded.
- Administrator activity: In this things like addition of new policies, deletion of policies, assigned policies, changing of system settings and addition of new administrators are recorded.
Benefits of Audit
Better security: It provides benefits of better security like protecting the business from liabilities, security breaches and misuse.
Tracking feature: Tracking of every event that occurs on your account helps in detecting and preventing any suspicious activity that might happen and further give rise to unauthorized access. Tracking every searches, uploads, deletes, downloads, views, edits and shares helps in providing all the required information for corrective actions.
Risk management: Businesses with complete audit logs are viewed by customers, business partners and regulators that the business has taken preventive steps for potential risk.
Compliance: Audit log is also helpful for various purposes that requires compliance of records in business such as the Sarbanes-Oxley act.