You can view information about Phocas users at a system-wide level or on an individual basis. Exactly what information you can see will depend on your administration profile.
- You can monitor individual user activity from the Usage, Query or Audit tabs on the user maintenance form.
- If you have permission, you can access a system-wide Audit log from the administration module.
Monitoring individual activity
...
...
...
From the administration module, select a name to open the user maintenance form for that user, then choose from the Usage, Query or Audit tab. See:
Accessing a system-wide audit log
Administrators with permission can access a system-wide log of significant changes to user accounts from the Audit log. Not all administrators have access to view the audit log. Administrators logged in as the 'phocas' user can give other administrators permission to access the audit log via Manage user profiles.
From the Administration module select > Audit to open the audit form. See:
Administrators can keep track of individual user activity via the following methods using the user maintenance form. Depending on your profile, not all of these options may be available.
If you have administrator permission you can monitor individual user activity from the Usage, Query or Audit tabs on the user maintenance form. Depending on your profile, not all of these options may be available.
To access user activity data:
Select a name to open the user maintenance form for that user and then select the required tab.
...
maxLevel | 2 |
---|---|
minLevel | 2 |
location | top |
Usage
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
To enable detailed query logs
Enable the Detailed Logs feature from the User maintenance form, as shown below.
Audit page
...
...
Audit
Excerpt |
---|
Only administrators with permission can access this screen. All significant changes to user accounts are recorded in the Audit |
...
screen of the |
...
View and change user settings (user maintenance form). This data is recorded automatically and is captured at a database level, so any changes made outside of the application 'through the back door' are also recorded. The date/time of the event is included |
...
. |
...
The user-related events that are audited are:
|
...
|
...
Details of the 'From' and 'To' fields are truncated at 50 characters; for a detailed view of the change click on the 'From' or 'To' link |
...
System-wide audit
...
. |
...
...
title | Related articles |
---|
...