10 Activity Logs

Oracle® Communications Security Shield Cloud Service (Security Shield) Activity logs provide a view of user activity to help with troubleshooting and audits. You can see logged activity such as configuration changes to access control lists, threshold parameters, and on-premises software components.

Activity Log Controls and Actions

The Oracle® Communications Security Shield Cloud Service (Security Shield) Activity Log displays logged information in categories, which you can search for details. Security Shield creates the logs while registering a Session Border Controller (SBC) or the Cloud Communication Service (CCS) or when unregistering an SBC or CCS for a tenant.

The following screen capture shows the Activity Log page. The Activity Log can display up to 1,050 logs, which you can view by scrolling down the table.

This screen capture shows the Activity Log page with the navigation pane on the left and examples of the logs in the center pane.

Activity Log Triggers

The system creates logs for the following events:
  • Call Type Classifications and Reputation Score Classifications—When a user changes the enforcement action.
  • Access Control Lists—When a user creates, edits, or deletes and Access Control List.
  • Notifications—When a user enables or disables notifications and when the system triggers alerts.
  • Automatic Threat Protection—When a user updates thresholds.
  • Outbound Number Management—When a user modifies outbound numbers and settings.
  • Number Normalization—When a user enables or disables number normalization fields.

Activity Log Column Descriptions

The Activity Log shows the following information sorted by timestamps in ascending order in a scrollable list.
  • Timestamp—Shows the date, time, and time zone of the log entry.
  • User—Shows the name or email address of the user who performed the action on the date of the timestamp.
  • Category—Shows the log category. Access Control Lists | Autonomous Threat Protection | Reputation Score Classification | Configuration Wizard.
  • Object ID—Shows the name of the affected object within the Category, for example, a phone number on an Access Control List or an enforcement action on a Telemarketing Call Classification.
  • Action—Shows the action performed on the affected object. Add | Edit | Delete.
  • Activity Details—Shows the details of the action performed on the object, including both the former value and new value. Click the twister control to the left of the Timestamp to see Activity Details.

Note:

You cannot remove an activity log. Only the system can remove an activity log, which occurs when the maximum number of logs accrues (100,000).

The following screen capture shows an example of an expanded log, showing the Activity Details. The Activity Details show the name of the affected configuration parameter, which is Use PAI in this example, and the Old and New values for the parameter.

This screen capture shows the Activity Log page. One log is expanded to show the Activity Details that correspond to the log. The details show the name of the affected configuration parameter, which is Use PAI. The details show the Old value and the New value set for Enforcement Action.

The Activity Log builds the results of searches dynamically, where the search results show only users and categories for which a logged event occurred. For example, suppose you search for UsernameAbcd@companynameXyz.com and UsernameAbcd@companynameXyz.com did not perform any logged event in the time frame you selected for your search. The results will not display UsernameAbcd@companynamexyzin the results list. The same behavior applies to searching by category, where the results display only the categories in which a logged event occurred.

Multiple Users and Log Viewing

When User1 is viewing the Activity Log and User2 makes changes to a configuration, User1 does not immediately see the changes. User1 must refresh the table to see User2's changes.

Search the Activity Log Using Filter Chips

To help you find logs, the Oracle® Communications Security Shield Cloud Service (Security Shield) Activity Log tab displays a set of filter chips that you move to the Search field to help narrow your search.

Procedure
You can set multiple filters and you can change or clear them, as needed.

Note:

The Search with filters function does not support saving searches.
  1. Access the Activity Log page.
  2. Move one or more of the filter chips into the Search field.
    • Date Range—Click the chip to display the date range picker, where you set a custom date range.
    • User—Click the chip to display a list of users and select a user.
    • Category—Click the chip to display a list of categories and select one or more categories. Choices: Topology | Reputation Score Classification | Access Control List | Notifications | Inbound Call Number Normalization
    • Action—Click the chip to display a list of actions and select one or more actions. Valid Values: Add | Edit | Delete.
    • More Filters—Click the chip to display a list of fixed time frames for the search. Valid Values: Last 24 Hours | Last 7 Days | Last 30 Days.
  3. View the logs and click the twister by the timestamps to see the details of each one.

Search the Activity Log Using the Object ID

At the top of the page, the Activity Log tab displays the Search field to help you find activity logs for a certain object that the Oracle® Communications Security Shield Cloud Service (Security Shield) logs. The term "Object" can refer to a call classification type, the name of a system in your network, an Anonymous Threat Protection setting, a phone number, or the name of an Access Control List.

Before You Begin
  • Find the object ID, such as the name of an object within the Category, for example, a phone number on an Access Control List, or an enforcement action on a Telemarketing Call Classification.
Procedure

Use the following procedure to save time searching when you know the Object ID.

  1. Access the Activity Log page.
  2. In the Search Object ID field, enter the Object ID. The field is not case sensitive.
    Security Shield displays the results in a list that you can scroll.