How to consult the Audit Log in wolkvox Manager?
Learn how to access and analyze the Audit Log in Wolkvox Manager to improve the control and monitoring of your platform.
Table of Contents
Symptom or Need
The user or administrator needs to track, verify, analyze, or audit actions performed within the wolkvox Manager platform (such as configuration changes, user creation, campaign modifications, skill management, or license movements, among other key administrative actions), identifying which user executed each action, at what time, and from which IP address.
Context / Scenarios
To consult the Audit Log (also known as the Manager Log), the user must strictly have the following profile:
Administrator with Full Control
Note: Without this permission profile, the Audit Log module will not be visible on the platform.
Response / Solution
- Access Path to the Audit Log
To access the tool, follow these steps:
- Log in to the wolkvox Manager platform.
- Go to the Gear icon (Settings) located in the upper right corner of the screen.
- Within the settings menu, scroll to the right using the scroll bars or lateral navigation guides.
- Locate the section named "Audit Log" and click on it.
- Using and Filtering Information
The log record allows you to segment information to facilitate the search for specific events. To use it correctly:
- Define the search range by selecting a start date and an end date to locate actions performed within a specific period, audit changes in specific intervals, and verify recent or historical activities.
- Click the "View" button.
- The platform will display all events for that time interval in a sequential, chronological, and detailed manner.
- Information Displayed in the Log
When viewing the results, you can audit the following key data for each action:
- Date and Time: The exact moment of the change.
- User: Name of the user who performed the modification.
- IP and Device: Source IP address and the name of the workstation from which the action was executed.
- Action Executed: Details of the change, such as: creation, blocking, or unblocking of users; assignment of agent IDs; skill creation or management; and modification of campaigns or configuration parameters.
Benefits and Considerations
Using the Audit Log is essential for administrative control and change verification. Its main benefits include:
- Internal Audits: Allows you to verify exactly who made changes, what was modified, and when. This facilitates regulatory compliance processes and ensures a historical record of all actions.
- Administrative Control: Helps supervise critical and operational actions on the platform, providing greater transparency in operational management.
- Incident Analysis: Enables quick identification of configuration errors or suspicious activities, supporting the rapid resolution of technical incidents.
- Access Identification (IPs): Highly useful for validating unusual connections or network operational failures, improving platform security and control.
- License Movement Verification: Allows confirmation of activation, deactivation, or relocation of licenses in the system, making it easier for support and supervision teams to track resources.