Forensic Activity History Edit on GitHub Request doc changes

Contributors netapp-alavoie

The Activity History page helps you understand the actions performed on entities in the Cloud Secure environment.

Examining Activity History Data

Click Forensic > Activity History to access the Activity History page. The data available on this page describes:

  • The time an entity was accessed including the year, month, day, and time of the last access.

  • The user that accessed the entity with a link to the User Profile.

  • The activity the user performed:

    • Create

    • Read

    • Read Metadata

    • Copy

    • Delete

    • Write

  • The path to the entity with a link to the Entity Detail Data

  • The entity type:

    • Stream

    • File

    • Directory

    • Symbolic Link

    • Other Type

  • The location (IP address) from which the activity was performed.

Filtering Forensic Activity History Data

You can filter Forensic Activity History data by the following:

  • The Activity type:

    • Created

    • Read

    • Read Metadata

    • Copied

    • Deleted

    • Write

  • Entity type:

    • Stream

    • File

    • Directory

    • Symbolic Link

    • Other Type

  • Location that the entity was accessed from

  • Path of the entity

  • Time the activity occurred

  • User performing the activity