How to generate the audit Logs for the Impersonation Control Service
search cancel

How to generate the audit Logs for the Impersonation Control Service

book

Article ID: 402737

calendar_today

Updated On:

Products

Email Security.cloud

Issue/Introduction

This article describes the steps to take in order to generate the logs for the Impersonation Control Service.

Environment

Email Security.cloud

Resolution

In order to check if the Impersonation Control Service is triggering emails , you can generate the report for the EIC service by going to  Reports > Report Requests

1 - Click request New report Tab 

 

2 - Under Email data , select Email detailed report 

3 - Select : Email Impersonation Control

4 - Click Continue and proceed with the next tabs depending on the period needed for the EIC audit log.