Go to documentation repository
In order to create a change protocol report, do the following:
In the Operators field (1), set the checkboxes next to those users who have the rights to make change. You can also use the search by operators (2). Be default, the list of operators is sorted by name. To sort by number, select this option from the Sort by drop-down list (3).
Note
The Unauthorized user value means change of system by a user who wasn't authorized, or a user who was removed from the system, and/or a user who had their rights deleted.
In the Object field (6), set the checkboxes next to the objects which changes you want to display in the report. You can also use the search by objects. To do this, enter the name of the object (minimum four characters) in the Search by inner objects field (1) and click the Search button (2). As a result, the found objects will be displayed in the additional object tree (3). To cancel, click the Clear search tree button (4). By default, the list of objects is sorted by name. To sort by number, select this option from the Sort by drop-down list (5).
From the Period drop-down list (7), select the time period to build a report.
Note
If you selected the Custom period, enter the date of start and end periods for which the report must be created in the from and to fields using the Calendar tool. Click the
button near the corresponding field to use the Calendar tool.To create a report, click the Execute button (8).
Example of a change protocol report:
Note