Difference between revisions of "Audit Log"
Line 8: | Line 8: | ||
− | + | Login - If you want to limit your search by a certain login, click in the box and choose the login(s). The box to the left of Value works as a "Select All". | |
Categories -If you want to limit your search by a certain catergory, click in the box and choose the category(s). The box to the left of Value works as a "Select All". | Categories -If you want to limit your search by a certain catergory, click in the box and choose the category(s). The box to the left of Value works as a "Select All". |
Revision as of 09:12, 13 June 2014
This program will allow the user to view who has accessed certain programs and the a time stamp of when they entered.
- On the left, click on "System".
- Under "Entry", select "Audit Log"
- If you need instructions for setup values to be used, follow the link for Standard Setup Options.
- The next items are not found on the standard setup options document.
Login - If you want to limit your search by a certain login, click in the box and choose the login(s). The box to the left of Value works as a "Select All".
Categories -If you want to limit your search by a certain catergory, click in the box and choose the category(s). The box to the left of Value works as a "Select All".
Programs - If you want to limit your search by a certain program, click in the box and choose the program(s). The box to the left of Value works as a "Select All".
Permissions -If you want to limit your search by a certain permission, click in the box and choose the permission(s). The box to the left of Value works as a "Select All".
Host Name - If you want to limit your search by a certain host name, click in the box and choose the host name(s). The box to the left of Value works as a "Select All".
IP Addresses - If you want to limit your search by a certain IP address, click in the box and choose the IP address(s). The box to the left of Value works as a "Select All".
Messages - If you want to limit your search by a certain message, click in the box and choose the messag(s). The box to the left of Value works as a "Select All".
Click OK to move to the next screen.
Definitions of Column Headers
- To find definitions of commonly used columns follow this link: Common Column Headers.
In addition to the common column headers on this report are:
Date - The date that the user accessed the program
Logins - credentials required to obtain access to a program
Categories - which area you want to search
Programs - which program in the category chosen you want to search
Permissions - profiles of users that defines their permission into programs
Host Name - the computer the user was on
IP Addresses - the IP address of the user's computer
Messages -
Java version - lists the version of Java used by the user's computer
JPAMS version - lists the version of JPAMS by the user's computer