6.1. Monitoring - System and Security
  • 13 Nov 2023
  • 1 Minute to read
  • Dark
    Light

6.1. Monitoring - System and Security

  • Dark
    Light

Article summary

Included in this section are:

  • Recording Access - create profiles to give users access to different levels of voice recordings. The number of profiles that have been set are displayed here.
  • Event Logs- view event logs. The number of event logs generated today are displayed here.
  • Error Logs - view error logs. The number of error logs generated today are displayed here.
  • Scheduled Jobs - each of which can be stopped and started as required. When a job is running, the data collected informs Reports.



Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence