Updated on 2024-06-12 GMT+08:00

Managing Password Logs

After a password rule is executed, logs are generated accordingly. You can view the password change details in password change logs.

Prerequisites

You have the operation permissions for the Password Rules module.

Viewing Log Details

  1. Log in to the CBH system.
  2. Choose Policy > Password Rules > Password Log to view and manage password change logs.
  3. Query password change logs.

    Quick search: Enter a keyword in the search box and search for password change logs by rule name.

  4. Select the password change log and click Detail.

    You can view the log content, including the basic information and password change result.

    Figure 1 Viewing password log details

Downloading Password Logs

  1. Log in to the CBH system.
  2. Choose Policy > Password Rules > Password Log to view and manage password logs.
  3. Click Download.
  4. Confirm downloading information.

    1. Set encryption password: This parameter is optional. If this parameter is not set, the downloaded password change log is an unencrypted CSV file. If you set a password, the downloaded password change log is an encrypted .zip file.
    2. User Password: This parameter is mandatory. You need to enter the login password of the current user and then the password change log can be downloaded only after the verification is successful. This ensures password security of managed host accounts.
    3. Click OK to download the file locally.

Deleting Execution Logs

  1. Log in to the CBH system.
  2. Choose Policy > Password Rules > Password Log.
  3. To delete one execution log, select the one you want and click Delete in the Operation column to delete it.
  4. To delete multiple execution logs at a time, select the ones you want and click Delete at the bottom of the list to delete all selected logs together.