Checking Audit Logs (User Activity)

Checking Audit Logs (User Activity)

Overview

Audit Logs Tracking in Meritto allows administrators to monitor engagement, actions, and interactions within the system.

  • Activity Monitoring: Track user interactions and task completion.

  • Identify Inefficiencies: Analyze workflows to improve system usage.

  • Ensure Compliance: Maintain adherence to operational guidelines.

This helps institutions optimize user management and enhance system efficiency.

Plan & Permissions

To check Audit Logs, you must have the following permissions:

  • Manage Users

  • View Audit Logs

Ensure that these permissions are enabled before proceeding.

To access Audit Logs logs:

  1. Log in to your Meritto account.

  2. Navigate to User Access Control from the menu.

  3. Click on Audit Logs to view activity logs.

Ways to Review Audit Logs

Meritto provides multiple ways to review Audit Logs efficiently:

Using Advanced Filters

You can filter Audit Logs data based on specific parameters:

  • Date Range – Filter activities within a selected timeframe.

  • User Role – View activity based on assigned roles.

  • User Name – Search for a specific user’s actions.

  • Module Name – Filter activity logs based on system modules.

  • Actions – Identify specific actions performed by users.

Once filters are selected, they will appear in the filter panel. Click Search to display relevant Audit Logs records.

Viewing User Actions

After applying filters, the system will display detailed logs of user actions. This includes:

  • Action Performed – A description of the user’s activity.

  • Timestamp – The date and time when the action was completed.

  • User Role and Username – Username and role of the user who performed the action.

Downloading Audit Logs Reports

For further analysis, you can download a complete report of user activities:

  1. Click on the Download Activity button located on the upper-right side of the activity records.

  2. The system will generate a report containing all filtered data.

  3. Save the report for audit purposes or performance tracking.

Conclusion

Monitoring Audit Logs in Meritto enhances transparency, accountability, and operational efficiency. By leveraging advanced filters and detailed reports, administrators can identify inefficiencies, ensure compliance, and improve overall system usage. This feature empowers institutions to make data-driven decisions, streamline processes, and maintain a secure and well-managed system.


    • Related Articles

    • Meritto Data & Logs Retention Policy

      Overview Meritto Data & Logs Retention Policy establishes guidelines for managing data retention, storage, and disposal. Compliance Assurance: Ensures adherence to legal and regulatory requirements. Data Protection: Safeguards sensitive information ...
    • Data Security

      Overview At Meritto, data security is deeply embedded across our infrastructure, application, and operational layers. Hosted on AWS, we leverage tools like WAF, GuardDuty, ELK Stack, and CodeCommit to ensure robust protection, continuous monitoring, ...
    • Creating New User in Meritto

      Overview User Creation in Meritto allows efficient management of user access and interactions within the system. New User Setup: Create user profiles to manage roles and permissions. Access Control: Ensure appropriate access levels for different ...
    • User Management and Team Hierarchy

      Overview User Management and Team Hierarchy enables efficient workforce organization and access control. Role-Based Access: Manage user permissions to ensure secure data access. Team Structuring: Define hierarchies for clear roles and ...
    • Assigning Permission to a User

      Overview Assigning the correct permissions to users in Meritto ensures they have access to the necessary modules and actions while maintaining system security. This article guides you through the process of assigning and managing permissions for ...