Updated on 2024-06-12 GMT+08:00

What Audit Logs Does CBH Provide?

CBH provides instance and system audit logs.

Instance Auditing

To audit CBH instances, you need to enable Cloud Trace Service (CTS) to record operations on CBH instances. The CTS management console stores the operation records of the last seven days.

System Auditing

A CBH system centrally manages user login and provides system logs and system reports. In addition, CBH authorizes users to log in to managed resources and perform O&M operations. CBH provides records of the system and resource O&M, including history sessions and O&M reports. For details, see Table 2 CBH system logs.

Table 1 CBH system audit logs

Log Type

Content

History sessions

  • O&M session videos: The entire process of O&M sessions is automatically recorded by screencasting. You can play or download the screencasts online.
  • O&M session details: O&M session details generated for different users can be viewed online or exported to an Excel file. Session details include detailed operation records of resource sessions, system sessions, O&M records, file transfer, and collaboration sessions.

System logs

CBH displays the number of O&M operations by a specific user over time through line charts and generates comprehensive O&M analysis reports.

System logs include O&M time distribution, resource access times, session duration, number of access times from source IP addresses, session collaboration, two-person authorization, command interception, number of character commands, and number of transferred files.

O&M reports

  • System login logs: record detailed information about user login to the system. System login logs can be viewed online or exported as Excel files.
  • System operation logs: record detailed system operations. System operation logs can be viewed online or exported as an Excel file.

System reports

CBH collects statistics on user logins and system operations in a bar chart and generates comprehensive system management reports.

A system report includes information about user control, user and resource operations, number of user source IP addresses, user login methods, abnormal logins, session control, and user status.