6.3

Table Of Contents
Audit Users and the Environment in vRealize Operations Manager
At times you might need to provide documentation as evidence of the sequence of activities that took place
in your vRealize Operations Manager environment. Auditing allows you to view the users, objects, and
information that is collected. To meet audit requirements, such as for business critical applications that
contain sensitive data that must be protected, you can generate reports on the activities of your users, the
privileges assigned to users to access objects, and the counts of objects and applications in your
environment.
Auditing reports provide traceability of the objects and users in your environment.
User Activity Audit
Run this report to understand the scope of user activities, such as logging in,
actions on clusters and nodes, changes to system passwords, activating
certicates, and logging out.
User Permissions Audit
Generate this report to understand the scope of user accounts and their roles,
access groups, and access privileges.
System Audit
Run this report to understand the scale of your environment. This report
displays the counts of congured and collecting objects, the types and counts
of adapters, congured and collecting metrics, super metrics, applications,
and existing virtual environment objects. This report can help you determine
whether the number of objects in your environment exceeds a supported
limit.
System Component
Audit
Run this report to display a version list of all the components in your
environment.
Reasons for Auditing Your Environment
Auditing in vRealize Operations Manager helps data center administrators in the following types of
situations.
n
You must track each conguration change to an authenticated user who initiated the change or
scheduled the job that performed the change. For example, after an adapter changes an object, which is
associated with a specic object identier at a specic time, the data center administrator can determine
the principal identier of the authenticated user who initiated the change.
n
You must track who made changes to your data center during a specic range of time, to determine
who changed what on a particular day. You can identify the principal identiers of authenticated users
who were logged in to vRealize Operations Manager and running jobs, and determine who initiated the
change.
n
You must determine which objects were aected by a particular user during a time specic range of
time.
n
You must correlate events that occurred in your data center, and view these events overlayed so that
you can visualize relationships and the cause of the events. Events can include login aempts, system
startup and shutdown, application failures, watchdog restarts, conguration changes of applications,
changes to security policy, requests, responses, and status of success.
n
You must validate that the components installed in your environment are running the latest version.
vRealize Operations Manager Customization and Administration Guide
20 VMware, Inc.