Views:
The Audit Log screen enables you to track the administration and user events occurred in Cloud Email Gateway Protection.
Cloud Email Gateway Protection maintains up to 30 days of audit log information.
The Audit Log screen provides the following search criteria:
  • Account and Activity Type: The account name and the type of activity for which you want to search the audit log.
  • Dates: The time range for your query.
When you query audit logs, use the various criteria fields to restrict your searches. After a query is performed, Cloud Email Gateway Protection provides a list of log records that satisfy the criteria. Select one or more records and click Export to CSV to export them to a CSV file.
To see the detail of an event, click on the time under the Timestamp column.
The Audit Log Details screen displays the following information:
  • User: The administrator or user name under which the event occurred.
  • Event Type: The type of event that occurred.
  • Timestamp: The date and time when the event occurred.
  • Affected Domain(s): The domains (if any) that were affected by the event.
  • Fields:
    • Field: The name of the fields that were affected by the event.
    • New Value: The latest value of the field after the event occurred.
    • Previous Value: The previous value of the field (if any) before the event occurred.