Skip to main content
You can query all event messages that occurred before a user’s submission reached its final status. After entering a specific person’s name or a specific submission ID, you can check what event logs were stored for each individual submission by specifying the event type and event date range. You can also view logs of administrator permission accounts added/deleted for the project and logs of deleted submissions.
Event log query screen

Search and Filter Options

OptionDescription
Specific Person NameTrack event logs for individual users
Submission IDView complete event history for a specific submission
Event TypeFilter by desired event type
Date RangeQuery only events that occurred within a specific period
You can view detailed content through messages for each type.

Trackable Event Types

Event CategoryIncluded ContentPurpose
Submission ProcessSubmission start, step-by-step progress, completion/abandonmentAnalyze user behavior patterns
Authentication ResultsApproval, rejection, pending status changesTrack decision process
Administrator ActivityAccount addition/deletion, permission changesSecurity and access management
Data ManagementSubmission deletion, information modificationEnsure data integrity
System EventsErrors, warnings, system notificationsSystem monitoring

How to Use Event Logs

Troubleshooting

Analyze causes of submission failures and derive solutions.

Security Audit

Review administrator activity and data access history.

User Support

Understand the exact situation when users inquire.

Process Improvement

Improve UX by analyzing event patterns.
Event logs can also be used as important evidence to meet audit requirements for regulatory compliance.

Administrator Permission Logs

All activities related to administrator permissions within the project are recorded:
  • New administrator account addition
  • Existing administrator account deletion
  • Permission level changes
  • Access permission modifications

Submission Deletion Logs

Records of deleted submissions are maintained for data protection and tracking:
Record ItemDescription
Deletion Executor InformationWho executed the deletion
Deletion Time and DateWhen it was deleted
Deletion ReasonReason for deletion (optional)
Deleted Submission Basic InformationWhich submission was deleted
Data SecurityEvent logs are important audit materials, so manage them so that only administrators with appropriate permissions can access them.

Log Analysis Tips

1

Regular Review

Regularly review abnormal patterns or error messages.
2

Drop-off Analysis

Identify and improve stages with high user drop-off rates.
3

Security Audit

Conduct security audits through administrator activity logs.
4

System Optimization

Optimize systems by analyzing activity patterns by time period.
5

Preventive Measures

Identify recurring error patterns and establish preventive measures.