Audit
VoiceConsole provides auditing for critical user actions. Actions that are included in the audit are:
- Account creation, removal, modification, or disabling
- Time and date of user login
- Start and end time for user access to the system
- Username or user ID of the user associated with the event
- Successful or unsuccessful attempts to access, modify, or delete security objects
- Successful or unsuccessful attempts to access, modify, or delete security levels
- Successful or unsuccessful attempts to access, modify, or delete privileges
- Concurrent logins from different workstations
- User actions involving access to data
- Configuration changes to the application
Audit Table
Table Features
Use Manage Filter to filter the items displayed.
The items shown in the table can be configured by clicking Add or Remove Columns.
Highlight one or more items and use Copy Selection to copy that information to the clipboard.
Display a printer-friendly version of the information by clicking Printable Version.
Audit Details
The audit records the following information for events:
- Audit Element: They type of action that triggered the notice.
- User Action: The action associated with the notice.
- Audit Details: A description of the event.
- Changed by: The user associated with the event.
- Source IP: The IP address where the event originated.
- Site: The VoiceConsole site associated with the event.
The Audit screen is a read-only screen. Permission to view the audit data can be configured via Roles. When creating a role, select the View Audit Data option to allow users with that role to view the Audit link.
At least one administrator must be configured to receive notifications and alerts. Audit data is retained for 90 days by default. Email and the retention interval are configured via System Configuration.
Additional information
- Honeywell recommends opening the VoiceConsole application using the IP address so that the Source IP column populates correctly.
- The Source IP column may show an IPv6 format depending on client machine configuration and HTTPS environment.
- If user information is not available, the Changed by column is populated with "System". This normally occurs when Schedulers run.
- System-related audit events are identified by "System" in the Site column.