Logging actions within the administration
Logging actions within administration
You can access this area with administrator permissions only.
You can track all actions that have taken place within the administration. Various actions in the administration, for example, the creation of a new user or changes to a user, are logged with the date and the name of the executing administrator.
Open the "Administration"
Open the 3-dot menu in the green bar at the top right
Select the "Enterprise settings" section
Open the "Admin logs" tab
In the list, the newest entries are inserted at the top, the oldest entries can be accessed via page navigation at the bottom.
You can narrow down the entries by filtering by a category or the administrator who made the change. To do this, click in the category or user field and select the topic you want to filter by. If you are only interested in a specific time interval, enter the start and end dates in the corresponding field. You will then see only the events in the list that were performed during this period. It is also possible to use all filters at the same time.
If you want to use the actions in the administration for further evaluations, activate the export. All data displayed in the list will be exported to an Excel file. If you have used a filter, only the filtered data will be transferred to the Excel file.
This article did not answer your question?
We are happy to help you! Just send us a message with your questions and we will get back to you as soon as possible.
Disclaimer
The content of this online help is intended solely for information and documentation purposes for our product idgard® and can be changed at any time without prior notice. We assume no responsibility or liability for errors or inaccuracies. Due to technical developments, uniscon GmbH reserves the right to change the functional scope of the product at any time.
Recent Articles
Authorize user group for files
If members of a data room are to be authorized for folders or documents, then "Extended Rights Management (ERM)" is suitable for this. To give a user certain permissions to folders or files, this user must first be assigned to a user group. The ...
Logging actions within the administration
Logging actions within administration You can access this area with administrator permissions only. You can track all actions that have taken place within the administration. Various actions in the administration, for example, the creation of a new ...
idgard System Update and possible Service Interruption - 24.05.2023
We are planning an idgard system update on the evening of May 24, 2023. The update will begin at 8:00 pm and is expected to last until 10:00 pm. We can not guarantee full availability of all idgard features during this period. Kindly consider ...
idgard® Outlook Add-in:Proxy tab
If your company uses a proxy server to communicate with the Internet, the proxy server's details must be included in the Office Addin settings before you can use it. Put in the corresponding details and click on the Save-Button. The proxy settings ...
Creating user groups for extended rights management
Extended rights management is available in the Enterprise package. Advanced rights management is used to assign permissions to the contents of a folder or file to groups of users. There are 2 methods to create user groups for the extended rights ...
Related Articles
Logging out of idgard®
Logging out In the sidebar at the bottom left, click the "Logout" button. If you have multiple sessions spread across different browsers and other devices such as smartphones, log out by selecting "Terminate all". Selecting "Terminate the current ...
Moving files within a PrivacyBox in WebDAV
Moving files within a PrivacyBox in WebDAV As in the idgard® web interface, when using WebDAV, only the user who created the Box or who has the corresponding permissions as Box administrator can move files from one folder to another. This permission ...
Logging in to idgard® via the use of a passcode (two-factor authentication)
Logging in to idgard® via the use of a passcode If someone has created your license with the protection of a passcode, you must enter it every time you log in to idgard®. You will receive the passcode via SMS to the stored phone number. Enter your ...
Logging in to idgard® using the TOTP password (two-factor authentication)
Logging in to idgard® using the T-OTP (time-based one-time Password) Sensitive data requires a higher level of protection. An authentication app must be installed before the TOTP process can be used. After setting up TOTP, the user must enter a ...
Move objects within a box
There are 2 methods to move a file, folder or message. You can use the "Move" function or move these objects using "Drag&Drop". If you want to move the objects of others, you need the right of a creator or administrator of a box. To move your own ...
Popular Articles
New features are available in idgard!
Today’s newsletter covers the most important information about the current updates in the idgard Web App, the integration of idgard in Microsoft Teams and new features in the idgard Mobile Apps. Check out some selected highlights below. Announcement: ...
Uploading files
Uploading files You can upload one or more files up to a size of 5 GB. For a fee, we can increase the size limit of 5 GB for you. You can only upload files with the "Write" permission. There are two methods with which you can upload files to a box. ...
Welcome to the idgard® online help
Welcome to the idgard® online help This online help is the main source of information for learning and working with idgard®. Click on one of the following links to obtain further information about idgard®. To use the online help: Search article Enter ...
Isn't encryption on the device the best bet for a safe cloud?
Isn't encryption on the device the best bet for a safe cloud? The term „cloud computing“ encompasses two aspects: Data storage in a cloud for one’s self, excluding multiple or third-party access. Data processing or storage of information in a cloud, ...
Legal issues related to idgard®
Legal issues related to idgard® The relevant aspects concern the telecommunications and data protection laws, as well as contractual issues regarding cloud services. The service idgard® and its sealed cloud technology are compliant with these norms ...