Heather Caldwell
OpenText Community Manager
If you found this post useful, give it a “Like” or click on "Verify Answer" under the "More" button
Cybersecurity
DevOps Cloud
IT Operations Cloud
If an answer to your question is correct, click on "Verify Answer" under the "More" button. The answer will now appear with a checkmark. Please be sure to always mark answers that resolve your issue as verified. Your fellow Community members will appreciate it! Learn more.
Heather Caldwell
OpenText Community Manager
If you found this post useful, give it a “Like” or click on "Verify Answer" under the "More" button
That was a useful example, using both a report and the Time Machine functionaity to see what has happened to the user.
In the future versions, we'll try to anticipate even more complex investigations e.g. to be provided to an auditor during his assessment.
Our reports will already be structured according to the needed evidences to be compliant with the requested standard (e.g. ISO 27001)
That sounds interesting and I look forward to seeing those.