Security Violation Monitoring

To monitor security violations, use the Security Violation Monitoring section on the navigation panel.

NOTE. When roles of information security administrator and application administrator are separated, the Security Violation Monitoring section is available only for information security administrator.

The Security Violation Monitoring section:

As a result of the lack of access permissions, the current attempts to violate the system security are recorded: failed login attempts and actions on the objects.

NOTE. In the desktop application, security violations are registered only if the Security Violation Monitoring section is opened. When the security manager is closed, security violation records are not saved.

Security violation parameters

Update and set up table view

Event information

Search for security violation records

Clear security violation monitoring

Export event list

See also:

Tracking System Security Violations | Access Protocol | Controlling Foresight Analytics Platform and Metadata Integrity