Configuring Audit Logs
In an enterprise, improper or malicious sensitive operations by employees may cause data leakage or system damage. To prevent this situation and meet security audit requirements, enterprises need to implement a mechanism that ensures operators cannot view their own operation records. This prevents operators from taking further destructive actions after discovering that their errors or improper behaviors have been recorded.
CBH provides the audit log configuration function to meet security audit requirements. After audit log configuration is enabled, login users (except admin) cannot view their own operation records of real-time sessions, historical sessions, and system log modules even if they have the access permissions for these modules.
Prerequisites
You have the management permissions for the System module.
Procedure
- Log in to your bastion host.
- In the navigation pane on the left, choose System > System Config > Audit.
- On the right of Audit Log Config, click Edit. In the dialog box displayed, enable this function.
- Click OK.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot