If you don't have the logs anymore and you aren't sending them off of the firewall then you essentially don't have anything to view what credentials were used to make those changes anymore. I would recommend you simply have anyone with credentials change them. Same thing goes with restoring the configuration or log files, if you weren't already sending them elsewhere you have nothing to restore from.
Just a few things I would really recommend you do to increase security:
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!