Audit
- 1 minute to read
- Print
- DarkLight
- PDF
Audit
- 1 minute to read
- Print
- DarkLight
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
Non-authorized accesses
To view logs of unauthorized access to credentials go to Discovery ➔ Audit ➔ Non-authorized Accesses. In this screen, you can view the access to the credentials registered in the vault made outside the vault, or without authorization. You can view a range of information such as username, device, login date and time, duration and source of access.
![](http://cdn.document360.io/5a1d58df-64ce-42a2-8b23-688477d32f33/Images/Documentation/image-1665074311031.png?sv=2022-11-02&spr=https&st=2024-07-27T02%3A37%3A10Z&se=2024-07-27T02%3A47%3A10Z&sr=c&sp=r&sig=oMCpXB4JQ6VGy5ztd2mfyQuoCE4n5MmZ2twAwHlfUow%3D)
Non-authorized accesses
Suspicious accesses
To view logs of suspicious access to credentials go to Discovery ➔ Audit ➔ Unauthorized Access. In this report you have access to credentials that are not managed by senhasegura but that are accessing the target device.
Was this article helpful?