Audit Log
This page will explain the functionality of the “Audit Log”.
Understanding the Log
- What kind of events are captured in the log.
- A description of each column: Time, User, Operation (Insert, Update, Delete), Table, and ID.
- How this log can be used for security, debugging, and compliance purposes.
Using the Log Interface
- How to navigate the log.
- (If applicable) How to use any search or filter functionalities.
- Explanation of the context menu for each log entry.