Task and activity history - view description
To verify a user's activity for completed tasks and their account activity, please:
select "Users" from the tab on the left, then select or search for a specific user:
View activity history:
go to the "activity history" tab, where you can see the information:
Activity type, activity date, related task, execution coordinates - default.
It is possible to expand the columns by pressing the checkmark on the right side at the height of the column names "column visibility":
Task History view:
Task history allows you to verify the tasks performed by a given user. To access this view, go to the 'Users' tab, click on the edit user profile icon and select 'Task history' from the tabs visible at the top.
There we can see information regarding:
- status
- date of activity
It is possible to extend the range of columns by pressing the checkmark to the right at the height of the column names "column visibility".
A view will appear that will allow us to expand the range of columns by:
- operating system
- device
- source
- application version
- task ID
- IpAddress
The IP address is recorded in the activity history when logging in or attempting to log in via both the web panel and the mobile app. Thanks to it, we can verify user logins, which increases security against unwanted incidents.
Task history allows you to verify the tasks performed by a given user. To access this view, go to the 'Users' tab, click on the edit user profile icon and select 'Task history' from the tabs visible at the top.
There we can see information regarding:
- status
- date of activity
It is possible to extend the range of columns by pressing the checkmark to the right at the height of the column names "column visibility".
A view will appear that will allow us to expand the range of columns by:
- operating system
- device
- source
- application version
- task ID
- IpAddress
The IP address is recorded in the activity history when logging in or attempting to log in via both the web panel and the mobile app. Thanks to it, we can verify user logins, which increases security against unwanted incidents.