Audits
  • 19 Oct 2022
  • 3 Minutes to read
  • Contributors
  • Dark
    Light
  • PDF

Audits

  • Dark
    Light
  • PDF

Article Summary

1. Audit management

Audits make it possible to verify all the actions performed in Constellio, thus the traces left by the use of precise functionalities. For example, you can check the elements added, modified, or deleted, user or administrative unit actions, etc.

Auditing is usually reserved for the system administrator or manager. However, it is possible to modify the roles that have access to the audit. To achieve this, it is necessary to access the Piloting, and open " Manage roles ", then check the " Consult the audit " feature.

To view the audits, it is necessary to access the " Audits " tab of the Constellio navigation bar.

Roles
Audits are not sensitive to permissions granted in Manage Security. So if the user has access to the audits, the user will have access to all the audits of the collection, regardless of the administrative units.

1.1 Use of audits

The audits all have in common the same usage page. This page provides a view, in a table, of the traces left by an action or access.

For each audit, it is necessary to choose the dates to which the audits will refer. To achieve this, a section allows you to target extreme dates. Once the dates have been chosen, the table gives an overview according to the actions and the values associated with them. Depending on each type of audit, a " Consult " button provides access to the details you are looking for.

To consult an audit on an action, simply: 

  1. Choose the type of audit sought;
  2. Target the dates to which audits will refer;
  3. Click on " View " to the right of the audit.

To view a specific audit, the procedure is the same. However, another step is added before validating the consultation. When choosing the audit, for example, " By file ", it is necessary to select the specific element. In this case, it is a question of targeting the file.

It is also possible to generate a report on the audits of the actions. To achieve this, a " Generate a CSV report " feature is present at the top of the page, near the table. The acronym CSV stands for Comma-Separated Values, and designates a spreadsheet-type computer file, whose values are separated by commas. The use of this type of file is particularly beneficial when it comes to gathering data into a separate and simplified document.


1.2 Audits on actions


Audit TitlesIconDescription
Folders creation / documents / tasksThis category of audits allows you to track the files, documents, and tasks that have been created.
Folders modification / documents / tasksThis category of audits tracks files, documents, and tasks that have been deleted.
Folders deleted / documents / tasksThis category of audits tracks files, documents, and tasks that have been deleted.
Request on folders / boxesThis category of audits tracks requests for borrowing, return, reactivation, and renewal of folders and containers.
Folders borrowed/returnedThis category of audits tracks files that have been borrowed and returned.
Box borrowed/returnedThis category of audits tracks containers that have been borrowed and returned.
Documents borrowed/returnedThis category of audits tracks documents that have been borrowed and returned.
Currently borrowed documentsThis audit category tracks documents that are currently borrowed.
Signed documentsThis audit category is used to track documents that have been signed.
Electronic signature module
To have this audit option, you must have installed the Constellio electronic signature module.
Downloaded documentsThis audit category tracks the download of Constellio documents. These are the documents downloaded by the "Download this document" action that are listed there.
Scanned documentsThis audit category makes it possible to track the digitization of documents in Constellio.
Scanning module
To have this audit option, you must have installed the Constellio scanning module.
Configurations modificationsThis audit category is used to track changes in metadata calculators.

1.3 Pilotage Audits

Audit TitlesIconDescription
System usageThis category of audits is used to track user logins.
Add or remove users and groupsThis category of audits tracks the additions and removals of users and user groups.
System reindexing and restartingThis category of audits tracks system reboots and reindexations.
DispositionThis category of audits tracks transfers, remittances, and destruction of records.
AgentThis category of audits allows you to track the operations performed with the Simple Agent and the Advanced Agent.
Batch processesThis category of audits makes it possible to follow the batch processing carried out by all users.

1.4 Audits on specific elements

Audit TitlesIconDescription
By departmentThis category of audits makes it possible to select an administrative unit and to monitor the operations related to it.
By folderThis category of audits allows you to select a file and track the operations related to it.
Per containerThis category of audits allows you to select a container and track the operations related to it.
By userThis category of audits allows you to select a user and track the operations related to it.

Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.