Tracking changes to workspaces, generator presets, and sensitivity rules
Required license: Enterprise
Required workspace permission: View the Protection Audit Trail
On Privacy Hub, the Protection Audit Trail tracks the following actions related to detecting and protecting sensitive data:
A Tonic Structural sensitivity scan flags a column as sensitive. Includes both built-in sensitivity types and custom sensitivity rules.
A user changes the assigned table mode for a table.
A user manually flags a column as either sensitive or not sensitive.
A user changes the assigned generator for a column.
From Privacy Hub, a user uses the Sensitivity Recommendations option to either:
Apply the recommended generator to selected columns
Ignore the recommended generator for selected columns
Mark selected columns as not sensitive
For these updates, there is an entry for each updated column.
Target and lookup tables are added to or removed from the subsetting configuration.
A post-job script is added or removed.
For child workspaces, the list includes updates to the parent workspace that the child workspace inherits. The list also indicates when the child workspace either breaks or restores inheritance.
In addition to the workspace-specific updates, the Protection Audit Trail also tracks:
When a generator preset is created, updated, or deleted.
When a sensitivity rule is created, updated, or deleted.
Navigating the list
The Protection Audit Trail entries are grouped by the date on which an action occurred.
By default, the list shows 10 actions per page. To change the number of actions per page, select an option from the View dropdown list.
Information for each change
Each entry in the Protection Audit Trail list provides the following information:
The left side of the entry shows the affected area and the type of action. Depending on the action, the affected area is either:
A table
A column
Subsetting
Post-Job Scripts
The right side of the entry shows who performed the action.
For a sensitivity scan, this is Privacy Scan.
For an action that a user performed, this is the user email address. For Structural users, the entry also indicates the user's role in the workspace.
For child workspaces, for an update that the child workspace inherited, this is Inherits from parent configuration.
Last updated