*Audit logging

How To Article | HTA-20220531-LG-19

iProtect Access / Security | How To Articles |

For system users (Installation | Authorization | System user) iProtect has logging available. The logging shows all the insert, delete and write in the iProtect database.

To see the audit there is a license needed with license id 39 called: Audit enabled. The license can be found in the menu “Installation | Database | License”.

The audit data stores a maximum of 400.000 records and works with first in, first out.

Audit menu:

The audit menu is found at “Installation | Database | Audit data”

Start time / End time:

You can search in the audit with a specific time frame

Option:

On this selection you can choose for the option show, where it displays the audit on screen. The option file is available for exporting the audit data to csv or xml format. The option report is to create a pdf report.

Selection:

  • No person and system user: Shows all audit of the changes the system mainly for adding hardware to the system.

  • System user: You can select the audit per system user.

  • Person: This option you can select every person in the system for audit. Employee’s, visitors etc.

Type the last name of the person and press on the

button to find the person.

Table name:

There is a selection of a couple of many used tables to search on.

ACCESSKEY – This is the table for the cards in the system. The interesting columns to search on are, the columns: RCN (Card number), VALID, STARTDATE, ENDDATE, UNLIMITED.

PERSON – This is the table where all the person to be found. The interesting columns to search on are, the columns: NAME, FIRSTNAME.

KEYKEYGROUP – This is the table where the Keygroups are selected on the cards.

READER – This is the table where all the readers are actively working. The interesting columns to search on are, the columns: STATUS (If the reader is changed from normal to open manually, it is seen here), PULSEREQUEST (If the reader is opened with a relais time)

 

Example:

In this case the search is on all changes made on card number 99999:

In this case the search is only on the validity change of card number 99999:

In this case the search is on all validity changes on all cards:

 

How to interpret the given data:

In this example you see the following:

  • Application: iProtect

  • System user: The system user that made the changes.

  • Action: insert (the record is added).

  • Table & Row: In which table and row the changes are made.

  • Old value > New value:

 

Action: The options are insert, update, deletion