The audit trail contains a detailed event log for all changes that have been made within the StrideLinx Cloud company. The audit trail can be used to see what has changed within the company. In the audit trail you can also see which person, server or device triggered a certain change, and when the change occurred.
RequirementsYou need to have a role with audit trail viewing rights to access the audit trail in your company.
Some of the fields in the audit trail are displayed as JSON code. Therefore, some knowledge on this topic might be necessary to understand certain details.
Please follow the steps described below to view details about a certain event.
- Go to the StrideLinx Cloud Admin which is accessible from the Apps menu in the top right corner if you are currently in a different StrideLinx Cloud app.
- Open the main menu , go to Audit trail , then click on [Details] for the event you would like to see in detail.
- Please look at the table below for a list of fields displayed in the event details section.
|Date and Time||The date and time when the event occurred in the configured timezone.|
|Timestamp (UTC)||The UTC timestamp of the date and time.|
|Action||The kind of action that occurred with the event (e.g. CREATE, UPDATE and DELETE)|
|Target||The object to which the action applies (e.g. a router or user)|
|Actor||The person, server or device that caused the event.|
|Topic||Detailed information about the target and the of which a target is part.|
|Before||The configuration as it was before the event occurred|
|After||The configuration as it was after the event occurred|
Time limitEvents in the audit trail will be saved for a period of 6 months. This means that you can review past events up to a maximum of 6 months.