Go to documentation repository
Previous page Next page
In order to create a protocol report, do the following:
In the Operators field (1) set checkboxes in those users who have rights to change objects. You can also use the operator search.
Note
The Unauthorized user value means change of system by unauthorized user, deleted user and/or user with deleted rights.
In the Object field (4), set the checkboxes next to the objects which changes should be displayed in the report. You can also use the search by objects. To do this, enter the name of the object (at least 4 characters) in the Search by inner objects field (1) and click the Search button (2). As a result, the found objects will be displayed in the additional object tree on the right (3). To cancel, click the Clear search tree button (4).
From the Period drop-down list select the time period for which the report is to be created (5).
Note
If the Custom period is selected, enter the date of start and end periods for which the report is to be created in the from and to fields using the Calendar tool. Click the
button near the corresponding field to use the Calendar tool.To create a report click Execute (6).
Example of a change protocol report:
Note