Modification Log
Location:
In the Modification Log, an entry is made for every addition, change and deletion of the program data and settings. This includes:
- Payment Systems for Purchase invoices, Travel claims and Travel plans
- Settings and workflow steps for Purchase invoices, Travel claims, Travel plans, Contracts and Requisitions
- Requisitions Product Groups
- Identifying the purchase invoice type
- Information in the organization structure on companies and organization units. Actions concerning the default processors, posting rules, allowed bank accounts, and processor groups of the organization structure are also entered into the Modification Log. Additions, deletions, and changes to persons of the organization are entered in the User Log.
- Groups of companies as well adding companies to the group and removing them from the group.
- Suppliers, supplier lists, and supplier import interfaces
- Archive Settings and archiving delays
- General Settings
- Voucher Types
- Posting Structure
- Purchase order import interfaces and deletion of purchase invoices
- Payment feedback import interfaces
- Workflow Settings
- Logon Settings
- Log Settings
- Uploading interface files
- Product updates
- Saving the license
- Converting the bank accounts of suppliers, users, and the organization structure (companies and units) into the IBAN format. An entry is made both for succeeded and for failed modification attempts.
The specifications of the performed modifications are opened via the link in the Time column of a log entry.
Modification log transactions can be filtered by date range, user, entry type and organizational level. The User, Type and Organizational Level settings are saved as the user's default values for the next time. The current day is always applied as the default limiting factor for date ranges.
Upon displaying transactions in the Modification Log window, the rights for companies and company groups of the user browsing the transactions are taken into account. The user can only browse the modification transactions that the user is entitled to see. For example, a user can only browse those edited log entries that are directed to the companies and company groups that he/she has right to view. If the user has system level rights, the user can see all entries in the Modification Log.