Audit Trails
Audit Trails offer a detailed log of user activities and system events to enhance visibility, accountability, and compliance. Audit Trails track important and specific actions for users and systems. They emphasize to log critical actions. It determines a pattern and identifies any unauthorized actions. These actions are then audited.
The components such as Power Management, Patch Management, and Patch Reports are supported for Audit Trails.
When multiple activities are performed on various patches, the table mentions as multiple patches and details are captured in additional details.
Viewing the Audit Trails
To view Audit Trails, navigate to Admin > Audit Trails.
An event captured in the Audit Trails, may or may not have related records with additional details, or it is possible that it has related events, value changes made to an attribute, and additional attributes.
To view the additional details, click
.
To export the report, select All or Selected Records from the Export to CSV drop-down.
Understanding Audit Trails and Event Tracing
Audit Trails provide clear visibility into what happened and why it happened. You can easily follow the complete sequence of actions and trace any automated system change back to the original user activity that triggered it.
Event Recording and Attribution
The system records all actions based on the entity that performed them:
-
User Actions: When a user executes an action, such as deleting a device, the system attributes the log entry directly to them (e.g., Performed by: [user email]).
-
System Actions: If a user action automatically triggers subsequent events (e.g., system-initiated deletion of related data), the system records these separate actions as Performed by: System.
Tracing the Full Context
The Audit Trail links every related event in a sequence using a unique Trace ID. This linking ensures you can follow the entire chain of activity.
To understand why the system performed an action:
-
Locate the log entry attributed to Performed by: System.
-
Check the log's in the Related Records section.
The system identifies the original user action that initiated the chain of events in this section.
This tracing mechanism ensures you always understand the full context behind every system change. You can always trace a system event back to the specific user action that caused it.
To export the report, select All or Selected Records from the Export to CSV drop-down.
Audit Trails Access Methods
The Ivanti Neurons Platform offers several ways to get audit logs, recognizing the wide range and scale of your needs. Each option is designed for a specific situation:
-
Rapid Investigation
Use the Audit Trails for quick troubleshooting. It lets you search through 30 days of logs to diagnose issues and track down incidents as they occur.
-
Regulatory Compliance
Schedule automated reports that deliver up to 90 days of data directly to your email. This feature is perfect for record keeping, periodic audits, and long-term review.
-
Security Information and Event Management (SIEM) Integration
Leverage the Azure Blob Storage connector or the Splunk HEC connector or Amazon S3 connector to export logs to your cloud storage or ingest them into third-party SIEM tools. You configure the connector to send logs every 30, 45, or 60 minutes, making this the ideal way to automate long-term storage and integrate with your complete security monitoring stack.
Comparing Audit Trails Access Methods
The following table gives you the details comparison of different ways of accessing Audit trails in Ivanti Neurons Platform:
Feature/Method Data Retention Integration Best Use Case Audit Trails 30 days None Immediate troubleshooting, active monitoring. Audit Trails Report 90 days Manual download from email Compliance audits, periodic archiving, regular review. Azure Blob Storage Connector Continuously export logs every 30, 45, or 60 minutes SIEM via Azure Central storage, SIEM pipeline integration, log aggregation. Splunk HEC Connector Continuously export logs every 30, 45, or 60 minutes Splunk Enterprise Advanced analytics, central correlation, threat detection. Continuously export logs every 30, 45, or 60 minutes
Amazon S3
To further process logs stored in your S3 bucket, you can use Logstack or another similar ingestion tool to pull logs from S3 and ingest them into Elasticsearch. This enables seamless integration of your stored log data with your ELK stack for enhanced search and analysis.