Difference between revisions of "Audit Log"
From EDgearWiki
Jump to navigationJump to searchLine 5: | Line 5: | ||
#If you need instructions for setup values to be used, follow the link for '''<span style="background:yellow">[[Standard Setup Options]]</span>'''. | #If you need instructions for setup values to be used, follow the link for '''<span style="background:yellow">[[Standard Setup Options]]</span>'''. | ||
#The next item is not found on the standard setup options document. | #The next item is not found on the standard setup options document. | ||
+ | |||
Logins - If you want to limit your search by a certain login, click in the box and choose the login(s). The box to the left on Value works as a "Select All". | Logins - If you want to limit your search by a certain login, click in the box and choose the login(s). The box to the left on Value works as a "Select All". |
Revision as of 08:40, 13 June 2014
This program will allow you to view who has accessed certain programs and the a time stamp of when they entered.
- On the left, click on "System".
- Under "Entry", select "Audit Log"
- If you need instructions for setup values to be used, follow the link for Standard Setup Options.
- The next item is not found on the standard setup options document.
Logins - If you want to limit your search by a certain login, click in the box and choose the login(s). The box to the left on Value works as a "Select All".
Categories -
Programs -
Permissions -
Host Name
IP Addresses
Messages -
Click OK to move to the next screen.
Definitions of Column Headers
- To find definitions of commonly used columns follow this link: Common Column Headers.