Difference between revisions of "Audit Log"

From EDgearWiki
Jump to navigationJump to search
Line 5: Line 5:
 
#If you need instructions for setup values to be used, follow the link for '''<span style="background:yellow">[[Standard Setup Options]]</span>'''.
 
#If you need instructions for setup values to be used, follow the link for '''<span style="background:yellow">[[Standard Setup Options]]</span>'''.
 
#The next item is not found on the standard setup options document.
 
#The next item is not found on the standard setup options document.
 +
  
 
Logins - If you want to limit your search by a certain login, click in the box and choose the login(s). The box to the left on Value works as a "Select All".
 
Logins - If you want to limit your search by a certain login, click in the box and choose the login(s). The box to the left on Value works as a "Select All".

Revision as of 08:40, 13 June 2014

This program will allow you to view who has accessed certain programs and the a time stamp of when they entered.

  1. On the left, click on "System".
  2. Under "Entry", select "Audit Log"
  3. If you need instructions for setup values to be used, follow the link for Standard Setup Options.
  4. The next item is not found on the standard setup options document.


Logins - If you want to limit your search by a certain login, click in the box and choose the login(s). The box to the left on Value works as a "Select All".

Categories -

Programs -

Permissions -

Host Name

IP Addresses

Messages -


Click OK to move to the next screen.



Definitions of Column Headers

To find definitions of commonly used columns follow this link: Common Column Headers.



Header5.PNG

Retrieved from EDgear Wiki