Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking
  3. Rules
  4. Connection Rules
  5. Security Rules
  6. Security Rule Set Simulator
  7. Masking Functions
  8. Glossary

Log Message rule action

Log Message rule action

Security rule action that uses a logger to log security rule event information.

0 COMMENTS

We’d like to hear from you!