| Table of Contents | |
|---|---|
| outline | true | type | flat
Summary
This guide outlines the process for extracting audit logs from Icertis application. Users with appropriate access can retrieve and export audit logs using reporting tools available within the system. Audit logs capture user activities such as login details, actions performed, and changes made during both regular and Emergency Access (PAM) usage. These logs can be filtered by user, date range, and activity type to support monitoring, compliance, and audit requirements. The Security team extracts audit logs on a periodic basis and shares them with the respective system owners for review and approval.
📝 Pre-requisites (Roles Required)
- Access to Reporting / Audit Log Reports in Icertis
- Appropriate Admin or Reporting permissions to view and export logs
- Security Team access for periodic log extraction and review
Step 1: Navigate to Reports
...
- Entity
- Entity Name
- Action Taken
- Action Taken Date
- User Name / Logged in User Email
- LoginTime
- Previous Value
- New value
- on behalf of user
Step 3: Export Logs
- Export the report, validate the logs for completeness and readability, and share them with the system owner for review.
...
