1. Introduction

An Audit log is a record of all actions taken within a software system. It provides a detailed and chronological history of user actions, such as data changes or system access, enabling system administrators to monitor and review user activity. The Audit log is an important tool for maintaining data security, ensuring compliance with regulations and standards, and troubleshooting issues within the system. By documenting all user actions, the Audit log provides accountability and transparency, allowing organizations to track and investigate any suspicious or unauthorized activity.

 

What the Audit log is and how it works in Prisym.

The Audit log in Prisym software is a feature that captures and records all user actions within the system. Every time a user performs an action, such as creating or modifying a record, the Audit log captures and stores information about the action, including the user's identity, the date and time the action was taken, and the specific details of the action itself.

 

By reviewing the Audit log, these users can track all user activity within the system and identify any actions. The Audit log in Prisym software helps organizations maintain data integrity, comply with regulatory requirements, and quickly investigate any issues or incidents that may arise.

 

Purpose of the Audit login Prisym.

The purpose of the Audit log in Prisym software is to provide a detailed and accurate record of all user actions within the system. This serves a number of important functions, including enabling system administrators to monitor user activity, ensuring compliance with regulations and standards, and maintaining data security.

 

Audit log provides a comprehensive and reliable source of information for auditing and investigation purposes. This can help organizations identify potential security breaches, prevent data loss or corruption, and ensure accountability and transparency within the system. Overall, the purpose of the Audit log is to help organizations maintain the integrity and security of their data and systems.

 

Overview of the different types of user actions recorded in the Audit log. 

The Audit log in Prisym software captures and records a variety of user actions within the system. These actions can include creating, modifying, or deleting records, as well as accessing data.

 

In addition, the Audit log may also capture information about user authentication and authorization activities, such as logins, logouts, and changes to user permissions. This information can be useful for monitoring system access and identifying potential security breaches or unauthorized activities.

 


  1. Accessing the Audit Log

To access the Audit log in Prisym software, users must first log in to the system. Once logged in, the Audit log button can be found on the main dashboard of the Prisym software interface.

 

Clicking on the Audit log button will open a new window that displays the Audit log data. From here, authorized users can review and analyse the information recorded in the Audit log, including user actions and system events.

 

Accessing the Audit log in Prisym software is a straightforward process, and the information provided by the Audit log can be invaluable for maintaining data security, ensuring compliance with regulations, and troubleshooting system issues.

 

Where the Audit log can be found in the Prisym software .

The Audit log in Prisym software can be easily accessed from the main dashboard of the software interface. Once users have logged in to the system, they can find the Audit log button prominently displayed on the dashboard.

 

 

 

Clicking on the Audit log button will open a new window that displays the Audit log data, providing authorized users with a detailed record of all user actions within the system.

 

By placing the Audit log button on the main dashboard, Prisym software makes it simple and intuitive for users to access this important feature. With just a few clicks, users can review and analyze the data recorded in the Audit log, helping to maintain data security, comply with regulations, and ensure system integrity.

 

 

  1. Reviewing Audit log entries

Reviewing Audit log entries in Prisym software is an important process that enables system administrators and compliance officers to monitor user activity within the system, detect potential security breaches, and ensure regulatory compliance.

 

The Audit log captures and records a wide range of user actions within the system, including creating, modifying, and deleting records, as well as accessing or downloading data. By reviewing the Audit log entries, authorized users can gain valuable insights into user activity and identify any unusual or suspicious behaviour.

 

To review Audit log entries in Prisym software, users can access the Audit log from the main dashboard of the software interface. From here, they can search and filter the Audit log data to find specific entries or analyse trends over time.

 

Overall, reviewing Audit log entries is a crucial part of maintaining data security and compliance within the Prisym software system.

 

Information included in the Audit Log.

Once users have accessed the Audit Log screen in Prisym software, they will be able to preview a comprehensive record of all user activities within the system. This includes information on user authentication and authorization activities, as well as data on the creation, modification, and deletion of records, and access or download of data.

 

 

In addition to this, users can also take advantage of the many features available in the Audit Log screen to further analyze the data. For instance, users can use the search and filter functions to find specific entries or analyze trends over time. The Audit Log screen also features a series of buttons on the top left-hand side that users can use to save the type of search performed, delete saved searches, and even export highlighted data into an Excel file.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

How to filter the Audit Log.

Filtering the Audit Log in Prisym software is an essential task for system administrators and compliance officers seeking to identify specific user actions or patterns of behavior within the system.

 

To filter the Audit Log in Prisym software, users can take advantage of the many features available on the Audit Log screen. The first way to filter data is by date, which can be done using the date range selection tool located at the top of the screen.

 

 

This tool allows users to select a specific range of dates or a pre-set time frame and a specific time zone, making it easier to analyze user activity over specific periods. Once the date range has been selected, users can then further filter the data using a range of search and filter functions available on the screen.

 

There are other ways to filter data on the Audit Log screen in Prisym software. The first way, as mentioned earlier, is by date range selection. The second way is to use the column headers to filter the data.

 

For example, users can filter data by operations performed by selecting an operation such as deletion from the "Operation" column. Alternatively, users can filter data by users by selecting a specific user from the "User" column, or by selecting a specific computer from the "Machine" column.

 

Overall, the filtering options available on the Audit Log screen in Prisym software make it easy to analyze specific user actions and patterns.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Common scenarios.

In the Common Scenarios section of the Audit Log screen in Prisym software, users can select specific information from the filtered data. This information includes filtering by date range, specific users, or specific operations performed within the system. By selecting these filters, system administrators and compliance officers can quickly identify and resolve issues related to system security and compliance. The ability to filter and select specific information in the Audit Log screen is a valuable tool for maintaining a secure and compliant system.