Texada SRM Technical Reference Manual
Texada SRM Technical Reference Manual

Function Access Log to Excel


System Maintenance Menu -> Configure System Settings -> Security Tab -> General Settings -> Function Access Log


Texada SRM provides a built-in automatic log of all functions accessed from a menu or sub-menu by each user.

The utility can be accessed from the Security tab of the Configure System Settings.
 An operator must be assigned a Security Role that allows permission to the Security - Function Access Log in order to access this program.

This access audit log is generated as an Excel spreadsheet for analysis and data manipulation.
 The prompts include:

FORMAT

The two options provided are:

Summary By Date:
 Because of the way the data is stored, the log is really only valid for the current year (i.e. last 365 days) for the 'Summary By Date' option.
 Each access record is stored by month/day and it will be over-written when a new record is generated for that month/day in the following years.

Last 7 Day Detail:
 This format is only available when 'Operators by Location' is enabled for the company and only available for the last 7 days.

FROM DATE

This start date defaults to the prior week, but the date range can be over-typed as required for the 'Summary By Date' option.
 This date is disabled for the Last '7 Day Detail' option.

TO DATE

The cut-off date defaults to today, but the date range can be over-typed as required for the 'Summary By Date' option.
 This date is disabled for the Last '7 Day Detail' option.

FUNCTION

An optional Function filter is provided with a window to search for and select a function.

SEARCH FOR

The search can be narrowed by using the keyword search which will pick records matching on:

Operator Name

Operator Login Name

Function Name

Function Text

Operator Code

Location Code

An Operator Search window is provided to select an Operator's System ID for a user specific search.

Finished? Click Accept to generate the spreadsheet or Cancel to abort.

Note: SCS maintenance activity is logged and the name in the log tracks the email address provided when the SCS user signed in.

Resulting Output:
 The logs are in spreadsheet format:

The 'Summary By Date' option lists the Division, Operator Login Code, the Operator Name, the Date, Function, Function Description, and the number of successful times accessed, and the LINUX login name or Client Name.
 With operator Security Roles there are no failures as the restricted option is just not available to limited users.
 The Failed column then only applies if failed attempts were tracked in earlier versions of the software using a different access security protocol.
 

The Last '7 Day Detail' log returns a record each time a function was accessed and includes the Division, Operator System ID, Operator Name, Date and Time of access, Function and Function Description.

Activity is always tracked for both GUI and non-GUI users, however the log can only be generated from a GUI Client.

Note: Only SCS Services can run this report for all companies across a SaaS environment.


Topic Keyword: RSML01