Audit Logs Tracking in Meritto allows administrators to monitor engagement, actions, and interactions within the system.
Activity Monitoring: Track user interactions and task completion.
Identify Inefficiencies: Analyze workflows to improve system usage.
Ensure Compliance: Maintain adherence to operational guidelines.
This helps institutions optimize user management and enhance system efficiency.
To check Audit Logs, you must have the following permissions:
Manage Users
View Audit Logs
Ensure that these permissions are enabled before proceeding.
To access Audit Logs logs:
Log in to your Meritto account.
Navigate to User Access Control from the menu.
Click on Audit Logs to view activity logs.
Meritto provides multiple ways to review Audit Logs efficiently:
You can filter Audit Logs data based on specific parameters:
Date Range – Filter activities within a selected timeframe.
User Role – View activity based on assigned roles.
User Name – Search for a specific user’s actions.
Module Name – Filter activity logs based on system modules.
Actions – Identify specific actions performed by users.
Once filters are selected, they will appear in the filter panel. Click Search to display relevant Audit Logs records.
After applying filters, the system will display detailed logs of user actions. This includes:
Action Performed – A description of the user’s activity.
Timestamp – The date and time when the action was completed.
User Role and Username – Username and role of the user who performed the action.
For further analysis, you can download a complete report of user activities:
Click on the Download Activity button located on the upper-right side of the activity records.
The system will generate a report containing all filtered data.
Save the report for audit purposes or performance tracking.
Monitoring Audit Logs in Meritto enhances transparency, accountability, and operational efficiency. By leveraging advanced filters and detailed reports, administrators can identify inefficiencies, ensure compliance, and improve overall system usage. This feature empowers institutions to make data-driven decisions, streamline processes, and maintain a secure and well-managed system.