Description
The ability to tag what tables and specific fields are being modified by what user, domain user, SQL User as well as the device IP address. Records only that field, Table and the before and after data. Create an Encrypted PDF file and identical Excel sheet. Also allows what new master files are created. More controlled versus just switching on table auditing.
Review Data Auditing Control Reports.