Audit Log
This program will allow the user to view who has accessed certain programs and the a time stamp of when they entered.
- On the left, click on "System".
- Under "Entry", select "Audit Log"
- If you need instructions for setup values to be used, follow the link for Standard Setup Options.
- The next items are not found on the standard setup options document.
Logins - If you want to limit your search by a certain login, click in the box and choose the login(s). The box to the left of Value works as a "Select All".
Categories -If you want to limit your search by a certain catergory, click in the box and choose the category(s). The box to the left of Value works as a "Select All".
Programs - If you want to limit your search by a certain program, click in the box and choose the program(s). The box to the left of Value works as a "Select All".
Permissions -If you want to limit your search by a certain permission, click in the box and choose the permission(s). The box to the left of Value works as a "Select All".
Host Name - If you want to limit your search by a certain host name, click in the box and choose the host name(s). The box to the left of Value works as a "Select All".
IP Addresses - If you want to limit your search by a certain IP address, click in the box and choose the IP address(s). The box to the left of Value works as a "Select All".
Messages - If you want to limit your search by a certain message, click in the box and choose the messag(s). The box to the left of Value works as a "Select All".
Click OK to move to the next screen.
Definitions of Column Headers
- To find definitions of commonly used columns follow this link: Common Column Headers.
In addition to the common column headers on this report are: