This article describes the steps to take in order to generate the logs for the Impersonation Control Service.
Email Security.cloud
In order to check if the Impersonation Control Service is triggering emails , you can generate the report for the EIC service by going to Reports > Report Requests
1 - Click request New report Tab
2 - Under Email data , select Email detailed report
3 - Select : Email Impersonation Control
4 - Click Continue and proceed with the next tabs depending on the period needed for the EIC audit log.