Administrator > Event monitoring
  

Event monitoring

You can monitor events for the assets, licenses, users, and Secure Agents in your organization through the asset and security logs. To view the logs, you must be assigned a role that has the Audit Log - View privilege.
You can monitor events through the following logs:
Asset log
Displays the following information:
To open the asset log, in Administrator, select Logs, and then select Asset Logs at the top of the page.
Security log
Displays events for Secure Agents and organizations such as when each agent was created or updated, when organization information was updated, and the name of the user who modified the agent or organization.
To open the security log, in Administrator, select Logs, and then select Security Logs at the top of the page.
The following image shows the asset log:
The asset log shows the date and time that the assets in the organization were created, copied, updated, or had permission changes. The user that triggered each event is listed in the first column. To switch to the security log, select “Security Logs” from the drop-down menu at the top of the page.
By default, the logs display events for the past 90 days. To change the length of time that events appear in the logs, contact Informatica Global Customer Support.
You can customize the properties that are displayed in the logs in the following ways: