View system configuration and FTP activity


The System Audit History page displays all system configuration and FTP activities, ordered by the most recent events.

These events include changes in user preferences or profiles, data visibility profiles, search exports, subscription jobs, and typically any other configuration activities that require adding or changing system settings. Complete details on any FTP activity in the instance also appear on this page.

Administrators can access the System Audit History page by clicking Logs > System Audit History in the Admin console.

By default, up to 50 entries for the past day display.

Each series of events is grouped according to Event ID. You can collapse a group by clicking its icon. Expand the group by clicking the icon.

Click any event line to view the specific details of the event, including the event description, property affected, new value, and old value, if applicable.

Each event includes the following information:

  • Event ID - a unique ID for each group of related events.
  • Timestamp - the date stamp for the system event.
  • User Name - the initiator of the event or System.
  • Item - the specific target of the event; for example, a Network field name, user, configuration ID, or entity ID.
  • Event Description - the type of event that occurred. This could be a detailed description of the event or any of the following:
  • Object Type - the type of object affected by the event, corresponding to a property or set of properties on a page in Network. This could be a detailed description of the event or any of the following:
  • Property - the object property that was changed. The values for this property can vary: it might represent a specific property or value in the Network UI; for example, locale or first name for a Network user profile, a status flag, an Inbox or profile layout, or a label. The context of the property relative to the corresponding object type, event, and values will help in determining its function.
  • New Value - the value assigned to the new or changed object property.
  • Old Value - the previous value assigned to an updated object property.

Tip: User Name, Item, Property, New Value, and Old Value columns - If the content in the column is too long, hover over the cell to display a tooltip containing the full text.

The possible values listed here include the most common values for each column. If you don't see the definition for a value that appears in an audit history log in your instance, let us know.

Filter by date

To view results for a specific time period, perform one of the following actions:

Choose a range from the Date range and To fields and click the Get History button.

Click the Choose time period drop down list and select a predefined period; for example, Last 7 days.

Filter by object type and property

Use the Object Types and Properties filters at the top of the history to refine the audit history by a specific object and its corresponding properties. The Object Types list is populated by a preset list of Network system audit objects; the Properties list is populated by all properties available for the specified object types.

Click a drop down list, select one or more values from the list, and click the Get History button to refine the history. You can click the Reset button to start over.

Note: You can select one value from the Properties drop down list, and multiple values from the Object Types drop down list.

Export the audit history

You can export the audit history to your local file system by clicking the Export button.

This downloads the refined history as a .csv file that you can open using a spreadsheet application.

FTP Activity

The system audit history also contains user activity for Network FTP folders. Relevant activities are logged for auditing and can be downloaded in the .csv file.

The following FTP activities generate logs:

  • Log in
  • Uploading files
  • Uploading folders with files.
  • Renaming files and folders.
  • Moving files and folders.
  • Uploading folders or files with insufficient permission.
  • Creating a new file with insufficient permission.
  • Deleting a file with insufficient permission.