Help > Administering Perceptive Enterprise Search > Auditing user activity

Auditing user activity

Set options for logging the activity of Perceptive Search users including log file specifications, user identification and monitoring specific Perceptive Search functions.

ID Information

User Ident

This holds the information which will identify each user of Perceptive Search. If you are the only user, type your name in here. If you are running on a network, you can include DOS environment variables in this field, for example, {USR} where the environment variable USR is set to a name in the user's autoexec.bat network login script with the SET command. For more information about environment variables please see your operating system manual.

Perceptive Search assigns special significance to the variable {UID}, when this identifier is used in the User Ident field, Perceptive Search will make a call to Windows to get the currently logged on User identification.

Audit Events

Queries

This logs all the queries that users run.

Results of queries

Logs the results of all queries that users run, including how many hits per query.

Errors

Logs all the error messages that Perceptive Search produces. This is useful in monitoring which users are having problems using Perceptive Search and what the most common problems are.

Documents browsed

Logs the names of documents that users browsed using the Perceptive Search Browser.

Documents activated using the Launch button

Logs the names of documents that users loaded into their native application.

Documents annotated

Logs documents annotated from within the Perceptive Search Browser.

Program loads/unloads

Logs the date and time each user loaded and exited the Perceptive Search Query program.

Index opens

Logs the indexes which have been queried.

Logging

Logging Enabled

Auditing can be disabled by unchecking this box. This will prevent any further entries from being written to the log file.

Log file

Define a file that you wish to use to log user activity. Type the name of the auditor output file in the Log File field. All users must have read/write access to this file. You can use DOS environment variables to specify this field, for example {ISYSLOG} where the environment variable ISYSLOG is set to a file name in the user's autoexec.bat or network login script with the SET command. For more information about environment variables please see your system manuals.

For more information about the log file, see Log file format