Working with security logs
The security log lists the transactions of interest. To open a security log, select File > View Security Log.
There are two possibilities:
The log is displayed immediately. (This is the log for the security file to which you are currently logged on.)
A Security File browser is displayed where you can locate and open a security file. Audit Viewer opens a security log once you have successfully logged on to the security file.
Compared to working with a database log, there are some minor differences:
The grid does not contain columns for record IDs or extra detail because these columns are relevant only to specific records, for which the security log does not record actions.
The Selection Criteria page has fewer controls. The unavailable controls are those relevant only to specific records.
The Actions page lists different actions and you cannot change the audit level. The extra actions are those relevant to database and security operations: compacting, converting, and upsizing databases; creating databases and templates; managing users and groups; and failed logon attempts.
You can only sort by date (in the Sort Order list).