81
This document is written and published by ShockWatch, Inc. All rights reserved.
USER MANUAL
The Security Log provides users with a detailed list of communication
activity for the ShockLog unit. This data includes dates and times of
activities, a description of the activity and provides an additional audit
trail for a data file. The ShockLog Security Log can only be cleared
by the factory during the ShockLog calibration process. For security
reasons, users cannot clear this file.
SECURITY LOG
To view and export the ShockLog security log, it is necessary to activate the “Security Log” key on the
communications window. Go to the View menu and select the Security Log Button. Return to the Communications
window and the Security Log button will be available.
After the Security Log button has been activated and a ShockLog unit is attached to the PC, clicking on the button
will bring up the following grid of information:
The Grid provides the following data columns:
Rec’ No
Sequential number given to every activity recorded.
Date & Time
Provides the specific date and time the activity occurred.
Entry
Provides a description of the activity recorded.
Data
Shows the size of the data recorded.
The grid can be sorted by column by clicking on the top of any of the columns. The data will be sorted by the
selected column. By sorting on the “Rec’ No” column, the data will return to the original order.
The Security Log data can be exported into a comma delimited file (*.csv) for importing into other applications
such as Microsoft Excel or Word. To Export the file, click the “Export” button at the bottom right hand side of the
grid. A file save window will appear. Amend the file name as required and select a different directory as required
from the drop down selection at the top of the screen.
Click the “Save” button and the file will automatically save as a .csv file for importing into other applications.