Skip to main content
LinkedIn
Copied!

Table of Contents

Tracking and auditing actions by developers and users

Version:

Only available versions of this content are shown in the dropdown

The security event configuration feature is part of security information and event management (SIEM), which combines security information management (SIM) and security event management (SEM). Use the Security Event Configuration landing page to configure the logging of security events so that you can diagnose system issues and demonstrate compliance to auditors.

Security events include actions performed by any requestor who accesses the application, data accesses or changes, changes to security policies or security-related rules or landing pages, and so on. With the logged security events you can then monitor inappropriate access to your data or system.

All security events include the following information:

  • Date and time
  • Application name
  • Node
  • IP address
  • Operator ID
  • Event class (authentication or authorization)
  • Event type

Authorization events can also include the following information:

  • The entered search string.
  • Report name, class, and filter condition.
  • The class, ID, and class- of the case state:
    • Open.
    • Unopened.
    • Blocked by an access policy.
Did you find this content helpful?

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.

Ready to crush complexity?

Experience the benefits of Pega Community when you log in.

We'd prefer it if you saw us at our best.

Pega Community has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice
Contact us