Skip to content

Extracting and Reviewing Usage Data

Access Risk Management extracts data of the Requestor's actions when they had elevated permissions. This data is used to generate a report Reviewers can use to whether they should accept or contest the usage.