Contents
System administration reports provide visibility into user activity, system health, and audit trails essential for maintaining secure and reliable inventory management operations. These reports help administrators monitor system usage, diagnose issues, track security events, and ensure compliance with audit requirements.
| Action | Path |
|---|---|
| Access Admin Reports | Reports → Select Type: Admin Reports |
| View Error Logs | Run Error Log report |
| Monitor User Activity | Run Login Activity or Session Activity reports |
| Check Email Status | Run Email Log report |
Admin reports focus on system operations rather than inventory data. They help administrators:
These reports are typically restricted to users with administrative permissions (Security ID 100) and provide access to sensitive system information.
Track application errors, exceptions, and system warnings to maintain system health and quickly diagnose issues.
| Report | Purpose | When to Use |
|---|---|---|
| Error Log | View all application errors with timestamps, user context, and stack traces | Daily monitoring, troubleshooting issues |
| Error Summary | Group errors by type to identify recurring issues | Identifying patterns, prioritizing fixes |
| Recent Errors | Last 24-48 hours of errors for immediate attention | Quick health checks, incident response |
Key Filters:
Best Practices:
Monitor outbound email activity to ensure notifications are being delivered and troubleshoot email delivery issues.
| Report | Purpose | When to Use |
|---|---|---|
| Email Log | Complete email history with recipients, subjects, and delivery status | Verifying email delivery, troubleshooting failures |
| Failed Emails | Emails that failed to send | Identifying delivery issues, correcting email configuration |
| Email Activity by User | Track who is generating automated emails | Monitoring notification usage, training needs |
Key Information:
Common Uses:
Track user authentication events to monitor security and analyze usage patterns.
| Report | Purpose | When to Use |
|---|---|---|
| Login Activity | All login attempts (successful and failed) | Security audits, investigating access issues |
| Failed Login Attempts | Authentication failures by user and IP address | Detecting brute force attacks, account lockout analysis |
| Active Sessions | Currently logged-in users | Monitoring concurrent users, license compliance |
| Login History by User | Individual user’s login pattern | User behavior analysis, attendance tracking |
Key Filters:
Security Monitoring:
Monitor active user sessions and application usage to understand system load and user behavior.
| Report | Purpose | When to Use |
|---|---|---|
| Session Activity | Current and recent session details | Performance monitoring, concurrent user tracking |
| Session Duration | How long users stay logged in | Understanding usage patterns, optimizing timeouts |
| Page Activity | Which pages users access most frequently | Feature adoption analysis, training needs |
| Session History | Historical session data for capacity planning | Long-term trend analysis, license planning |
Tracked Information:
Usage Analysis:
Comprehensive audit trails of data modifications, configuration changes, and user actions for compliance and security.
| Report | Purpose | When to Use |
|---|---|---|
| Audit Trail | Complete history of data changes with before/after values | Compliance audits, investigating data discrepancies |
| Configuration Changes | Admin option and system setting modifications | Tracking who changed what settings |
| User Activity Summary | Aggregated actions by user | Performance reviews, security investigations |
| Data Modification History | Changes to specific records (items, locations, orders) | Investigating data quality issues |
Audit Information:
Compliance Uses:
All admin reports support standard customization features:
Custom report filters can be saved for quick access to frequently-used views.
Admin reports contain sensitive information and should be restricted:
Recommendation: Limit admin report access to IT administrators and designated security personnel.
Admin reports can return large datasets. To improve performance:
Error logs and session activity tables grow continuously; older data may be archived based on retention policies (typically 90-180 days).
On this page