Contents of the View Part Data Security Audit Log Screen

Use the fields and options to configure the View Part Data Security Audit Log screen.

Date

Field Description
Option

From the drop-down list, select the range option for generating requisitions based on the item category that you selected. Valid options are:

  • All: Select this option to include all available records. You cannot use the Start and End fields for this option. This option displays as the default selection.
  • One: Select this option to include only one record. You must enter that value in the Start field. You cannot use the End field for this option.
  • Range: Select this option to include a contiguous range of records. You must enter the beginning value for the range in the Start field and the ending value of the range in the End field.
  • From Beginning: Select this option to include all the records from the beginning of the available records to a specific record. You must enter the last value for the range in the End field. The Start field is disabled for this option.
  • To End: Select this option to include all the records from a specific record to the end of all the available records. You must enter the value from which the range should begin in the Start field. You cannot use the End field for this option.
Start

Enter, or click to select, a value for the beginning of the range.

End

Enter, or click to select, a value for the end of the range.

Commodity

Enter, or click to select, the commodity code. The field to the right displays the commodity code description.  

Employee

Enter, or click to select, the employee ID. The field to the right displays the employee description.

Part

Enter, or click to select, the part ID.

Rev

Enter, or click to select, the revision ID. The field to the right displays the revision description.

Audit Log Type

Select one of the following to indicate the type of audit log to be viewed:

  • Unauthorized Only: Attempts to access protected items that are subject to part data security by unauthorized users.
  • Authorized Only: Access to protected items that are subject to part data security by authorized users.
  • Unauthorized & Authorized: Access to protected items that are subject to part data security by authorized users and attempted access to items that are subject to part data security by unauthorized users.

Table Window

Field Description
Date & Time

This displays the timestamp when access to restricted part data was made.

Audit Log Type

This displays whether the audit log type used is unauthorized, authorized, or both.

User ID

This displays the user ID that accessed or attempted to access restricted part data.

Employee

This displays the employee ID associated to the user ID that accessed or attempted to access restricted part data.

Employee Name

This displays the employee name that corresponds with the Employee ID.

Application Name

This displays the name of the application where access or access attempt was made.

Subtask

This displays the subtask where access or access attempt was made.

Part

This displays the restricted part ID.

Rev

This displays the restricted revision ID.

Part Desc

This displays the description of the restricted part/revision.

Commodity

This displays the commodity number of the restricted part/revision.

Comm Desc

This displays the description of the restricted commodity.

Transaction ID

This displays the corresponding Transaction ID for the restricted part/revision.