Audit Logs: User Access and Security

This article is a simple reference guide showing you the data fields expected from User Access and Security audit logs.

Resources