Log user impersonation [Updated in Security Center 1.3]
-
- UpdatedFeb 1, 2024
- 1 minute read
- Washington DC
- Platform Security
Configure glide.sys.log_impersonation to control if user-impersonating events are logged in your instance.
If this property is not set to the recommended value of true, user-impersonating events are no longer logged. The absence of logging could impact the automated security detection and investigation capabilities on your instance.