Audit Logs In Threat Stack

Follow

Audit Log

What is Audit Log

The audit log captures activity with in the Threat Stack application 

Audit log Fields 

  1. User : The user who performed the action in the app
  2. Type : The type of action 
  3. Description : Description of the action

Type

The following are the type of actions captured in Threat Stack application

  1. Alert
    • Dismissed
    • Suppressed
  2. User
  • Authenticated 

 

  1. AWS : AWS profiles
    • Create
    • Remove
    • Update
  1. Agent
    • Revoke 
    • Add
  1. Invite
    • Sent

Working with alerts

Users can search for type of alerts 

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments

0 comments

Article is closed for comments.