Hi @helannivas88
I agree with @Kurt_Bremser. The user must have write access to the file to be able to generate the file. Maybe to try and mitigate the risk, you could always move the logs to a secure location as soon as the SAS job finishes. This only leaves a window period from when the log was last written to, to the time being moved. E.g. put in a check to move the file as soon as the Workspace server PID dies.
But on another level, if you are dealing with cases where users are editing logs files as to alter the details of e.g. a query, then IMHO you are dealing with a case of fraud. If so, I would really suggest that you engage with your IT security to investigate.
... View more