Summary
This guide outlines the process for extracting audit logs from Icertis application. Users with appropriate access can retrieve and export audit logs using reporting tools available within the system. Audit logs capture user activities such as login details, actions performed, and changes made during both regular and Emergency Access (PAM) usage. These logs can be filtered by user, date range, and activity type to support monitoring, compliance, and audit requirements. The Security team extracts audit logs on a periodic basis and shares them with the respective system owners for review and approval.
π Pre-requisites (Roles Required)

Add the following fields to the report:


