Skip Ribbon Commands
Skip to main content
Navigate Up
Sign In

Quick Launch

Average Rating:

facebook Twitter
Email
Print Bookmark Alert me when this article is updated

Feedback

FAQ: What is the use of Security logs in IICS
Answer
Security logs in IICS are used for Event monitoring purpose. It displays information on events for Secure Agents and organizations such as when each agent was created or updated, when organization information was updated, and the name of the user who modified the agent or organization.

To view security logs, login to IICS UI and go to Administrator console, select Logs, and then select Security Logs at the top of the page.

2018_12_22_17_42_55_Informatica_Cloud.png

More Information
Note

1. Ensure that you have been assigned a role that has the Audit Log - View privilege to view asset logs in IICS.
2. By default, the logs display events for the past 90 days. 


Applies To
Product: Cloud Data Integration
Problem Type: Security
User Type: Developer
Project Phase: Implement; Configure
Product Version:
Database:
Operating System:
Other Software:

Reference

Attachments

Last Modified Date:11/11/2019 5:27 AMID:565089
People who viewed this also viewed

Feedback

Did this KB document help you?



What can we do to improve this information (2000 or fewer characters)