Fully record sensitive behavior logs
Provide powerful and diversified logging functions, covering multiple types of sensitive data access, desensitization recovery, access control and access behavior, and record the details of data interaction in detail, including time, IP address, user name, URL, rule type, alarm and other information, to ensure that a complete evidence chain is formed.