Previous Topic: Generating ReportsNext Topic: User Message and Violation Suppression


Ad Hoc Reporting

You can also produce ad hoc reports that address special situations. For example, if you suspect that one of your users has suspicious access patterns, you might audit the user and produce a one-time report of the activity.