Difference between revisions of "Audit Log"
Line 42: | Line 42: | ||
Login - credentials required to obtain access to a program | Login - credentials required to obtain access to a program | ||
− | + | Category - which area you want to search | |
Program - which program in the category chosen you want to search | Program - which program in the category chosen you want to search | ||
− | + | Permission - profiles of users that defines their permission into programs | |
Host Name - the computer the user was on | Host Name - the computer the user was on | ||
− | IP | + | IP Address - the IP address of the user's computer |
Message - | Message - |
Revision as of 09:13, 13 June 2014
This program will allow the user to view who has accessed certain programs and the a time stamp of when they entered.
- On the left, click on "System".
- Under "Entry", select "Audit Log"
- If you need instructions for setup values to be used, follow the link for Standard Setup Options.
- The next items are not found on the standard setup options document.
Login - If you want to limit your search by a certain login, click in the box and choose the login(s). The box to the left of Value works as a "Select All".
Categories -If you want to limit your search by a certain catergory, click in the box and choose the category(s). The box to the left of Value works as a "Select All".
Programs - If you want to limit your search by a certain program, click in the box and choose the program(s). The box to the left of Value works as a "Select All".
Permissions -If you want to limit your search by a certain permission, click in the box and choose the permission(s). The box to the left of Value works as a "Select All".
Host Name - If you want to limit your search by a certain host name, click in the box and choose the host name(s). The box to the left of Value works as a "Select All".
IP Addresses - If you want to limit your search by a certain IP address, click in the box and choose the IP address(s). The box to the left of Value works as a "Select All".
Messages - If you want to limit your search by a certain message, click in the box and choose the messag(s). The box to the left of Value works as a "Select All".
Click OK to move to the next screen.
Definitions of Column Headers
- To find definitions of commonly used columns follow this link: Common Column Headers.
In addition to the common column headers on this report are:
Date - The date that the user accessed the program
Login - credentials required to obtain access to a program
Category - which area you want to search
Program - which program in the category chosen you want to search
Permission - profiles of users that defines their permission into programs
Host Name - the computer the user was on
IP Address - the IP address of the user's computer
Message -
Java version - lists the version of Java used by the user's computer
JPAMS version - lists the version of JPAMS by the user's computer