Forum Discussion
TezzaB
2 months agoTrusted User
if its not a system journal you are referring to, you should be able use the Journal security audit report to reconstruct it
if its not a system journal you are referring to, you should be able use the Journal security audit report to reconstruct it