The Security Log feature is designed to help you track and monitor key actions performed in Kitomba 1 by your team, providing an additional layer of security for your business operations. Let's walk through the process:
1. Access the Security Log Page:
- First, go to the Kitomba 1 dashboard and select the Reporting tab.
- Then, click on the Security Log option.
2. Understanding Access Levels:
- The Security Log feature is accessible to Advanced, Advanced +, and Admin users by default. To modify access for additional staff members, visit the Kitomba 1 access levels page. Adjust the settings in the Reporting section to extend or restrict access as necessary.
3. Using the Log Filters:
- Selecting a Date Range: The Security Log allows you to examine actions performed within the last 12 months. Begin by choosing a date range, such as the last week, to focus on recent activities.
- Narrowing Down by User: Filter the log by selecting a specific user to see actions attributed to them.
- Choosing Log Types: Identify the nature of the activities you're interested in by selecting from options like appointment logs, invoice logs, or client logs.
- Log Filter: Further refine your search by entering keywords like an invoice number or a client/staff name in the log filter. For example, searching for the client name ‘Sally’ will filter logs related to actions involving her.
- Applying Filters: After refining your selections, click on the Apply button.
4. Reviewing filtered search results:
- Now, the security logs based on your search are listed here. You can click the Expand All button to reveal details for all search results and display comprehensive log information. Alternatively, click the blue right arrow to expand the individual log.
5. Reviewing Log Details:
- Within the log details card, you can access all the information related to this log action. This data helps you investigate unexpected edits or monitor specific activities while ensuring the integrity of your business operations.
Please note:
- Shows a log report of all actions performed in Kitomba 1 and who performed them within the last 12 months.
- Actions made in your local Kitomba are not included but can be viewed in the Kitomba security log report.
- To break down by staff person, individual staff must have a unique Kitomba 1 login.
That's an overview of how to use the Security Log in Kitomba 1. View our support guides to learn more or get in touch with us.
Comments
0 comments
Please sign in to leave a comment.