
Event Log Screen
Search and Filter Options
| Option | Description |
|---|---|
| Specific Person Name | Track event logs for individual users |
| Submission ID | View complete event history for a specific submission |
| Event Type | Filter by desired event type |
| Date Range | Query only events that occurred within a specific period |
Trackable Event Types
| Event Category | Contents | Use |
|---|---|---|
| Submission Process | Submission start, step-by-step progress, completion/interruption | User behavior pattern analysis |
| Verification Results | Approval, rejection, pending status changes | Decision process tracking |
| Administrator Activity | Account additions/deletions, permission changes | Security and access management |
| Data Management | Submission deletion, information modification | Data integrity assurance |
| System Events | Errors, warnings, system notifications | System monitoring |
Event Log Use Cases
Troubleshooting
Analyze submission failure causes and derive solutions.
Security Audit
Review administrator activity and data access history.
User Support
Accurately understand the situation when handling user inquiries.
Process Improvement
Improve UX through event pattern analysis.
Event logs are important evidence that can be used to meet audit requirements for regulatory compliance.
Administrator Permission Logs
All administrator permission-related activities within the project are recorded:- New administrator account additions
- Existing administrator account deletions
- Permission level changes
- Access permission modifications
Submission Deletion Logs
Records of deleted submissions are maintained for data protection and tracking:| Record Item | Description |
|---|---|
| Deletion Executor Information | Who executed the deletion |
| Deletion Time and Date | When it was deleted |
| Deletion Reason | Reason for deletion (optional) |
| Basic Information of Deleted Submission | Which submission was deleted |
Log Analysis Tips
1
Regular Review
Regularly review abnormal patterns or error messages.
2
Drop-off Analysis
Identify and improve stages where user drop-off is high.
3
Security Audit
Conduct security audits through administrator activity logs.
4
System Optimization
Optimize the system through time-based activity pattern analysis.
5
Preventive Measures
Identify recurring error patterns and establish preventive measures.