Track specified user actions by logging them in an audit report. This enables administrators to follow and acknowledge potentially harmful behavior by unauthorized users.
Note: Data is tracked separately. Refer to Data Entry Log.
Track specified user actions by logging them in an audit report. This enables administrators to follow and acknowledge potentially harmful behavior by unauthorized users.
Note: Data is tracked separately. Refer to Data Entry Log.
Accessing the Audit Log Options
Legal Notices | Your Privacy Rights
Copyright © 1998, 2024
Last Published Tuesday, November 19, 2024