[ED] Audits & Compliance

Being able to extract access logs and making sure every piece of important data is key for compliance with your security team. This chapter describes the tools available to monitor logs, explore shared resources on the whole platform at a glimpse, and also explore storage usage to find out who is using most space.

Back to top