Screening Transaction Logs

Screening Transaction Logs

As an administrator, you can check entire operation page activities by monitoring this page on the IQnext platform. Transaction logs are helpful to determine what operations have been performed by the users or other admins. 




A. To view Transaction Logs


  1. Log in to IQnext with the Administrator privileges.

  2. Go to Settings > General Settings Transaction Logs 


Here you can check the list of transactions that are performed by users, with the details like Action, Date, Floor, Building, Performed by, and Status.



Action

You can see the type of operation performed by the users in Action, whether it’s a rule change or other changes in the sensors setup.

Eg. Intensity changes, Mode changes, etc.


Date

You can view the exact timestamp of the operation performed next to the Action in this column and this will help you to track the exact moment the system underwent changes. 


Floor & Building

You can see for which building and floor transaction has been made. As the IQNext Portal can work simultaneously for different locations, you can view the building and floor details next to its respective entry.



Performed By

You can see the name of the user or admin who made the transaction or operation which keeps the entire process of operations transparent and easy to track.


Status

You can see the status of transactions like Successful, Pending or Failure. Since some transactions take time to execute or are not able to execute properly because of some error, you can pinpoint the faulty operation and even understand the non-responsive device, if any.


B.To filter the entries in the Transaction Log page

You can filter the transaction logs and focus on your desired building and floors.

  1.  After accessing the transaction tab

  2. Choose the workplace under consideration by selecting the Building > Floor from the dropdown under the Filter By location.                                                                                    

  1.  On the Select Floor dialog box, select desired Building and Floors and click on the Select at the end to confirm your choices.                                                                                                    

 


C. Export Transaction Logs

To perform calculations or to evaluate these transactions more deeply, you can download the transaction logs as an excel file on your device by:

  1. Log in to IQnext with the Administrator privileges.

  2. Go to Settings > General Settings Transaction Logs

  3. On the transaction Logs page click on the Excel icon. The entries will be downloaded in an Excel (.xslx) file.




    • Related Articles

    • Viewing Audit Log

      You can access a record of all the activities performed by the users whether operational or administrative in audit logs. This helps to track what operation was performed by whom and when. It also classifies operations into different categories and ...
    • Adding, Modifying HVAC Rules

      Applicable for: Indoor HVAC units that are Infra-Red (IR) enabled HVAC rule is a set of controls set by the user (facility manager) to (control) a specific HVAC workspace(zone). These HVAC rules use various input parameters as part of the decision ...
    • Mapping Lighting Zones

      To understand the placement of lighting devices in different zones, the user can view maps of different floors where each device’s geographical location is symbolically represented along with zone boundaries. Users can also gather basic information ...
    • Mapping HVAC Zones

      To understand the placement of HVAC devices like air conditioners, heaters or coolers in different zones, the user can view maps of different floors where each device’s geographical location is symbolically represented along with zone boundaries. ...
    • Multi Factor Authentication

      In order to add an extra layer of security, you can turn on multi-factor authentication that will require an OTP(One Time Password) to be entered after the password authentication. This feature proves useful in protection against hackers who may ...