Policy Audit
Policy Audit records pattern changes in runtime configurations for network devices deployed on your network. Matches to preconfigured patterns are logged.
- . Change of state. One of the following: Unavailable, Different, Same.
- . Device hostname, IP address, or custom label.
- . Configuration archive.
- . Pattern string.
- . Pattern description.
- . Boolean. Denotes case sensitive pattern matching.
- . Boolean. Denotes Regex pattern usage.
- . Denotes policy pattern type. One of the following: Exclude, Include.
- . Comma separated list of line numbers matching the pattern.
Fetch and filter log data
. Choose one or more host devices.
Use the Select Device dialog for one of the following:
Control
|
Purpose
|
Device ![](41713.png)
|
Browse and choose a single device.
|
Device Group ![](41715.png)
|
Choose an existing group of one or more devices. You can also create custom or dynamic groups.
|
: You can organize devices into custom or dynamic groups. For more information, see Grouping Devices.
.
Select rows based on specific column values, remove columns, and remove noise and chaff from the table.
Filter tables rows and hide and select columns
Click a column heading
and use the following from the drop down list:
Control
|
Purpose
|
Sort. ![](41693.png)
|
Sort column in ascending or descending order.
|
Columns. ![](41690.png)
|
Pick the columns you want to view. Click a check box to display the column. Clear the check box to hide it.
|
Group by this field.![](41691.png)
|
Group table into collapsible rows wherever the current column contains identical data ("field") values.
|
Filters. ![](42678.png)
|
Provide a keyword and use wildcards to view only rows that contain the keyword for the selected column or view.
Most column and log view filters provide the following wildcard matching:
- Match either zero characters or any one character ('?').
Example: 198.51.100.2? (Matches tokens with IP address ending with 2, or 20-29.) - Match either zero, any one, or many characters ('*').
Example: Stop* (Matches log strings containing Stop, Stopped, Stopping, and so on.)
|
Email, export, and save as PDF
Policy Audit event data can be exported, reused, and distributed. Select export (
) to access the following options: