The Security Log chronologically records tenant configuration changes, user activities, and other admin-level events. It does not include business transaction events — those appear in the Transactions section of the Skill Monitor. To open the Security Log, click Configuration and select the Security Log tab. Events are displayed as a table with the following columns:Documentation Index
Fetch the complete documentation index at: https://docs.abbyy.com/llms.txt
Use this file to discover all available pages before exploring further.
- The date and time of the event
- The user who performed the action that triggered the event
- The event type
- The name of the skill used to perform the action (if applicable)
- Additional information about the event
| Scope | Related events |
|---|---|
| Users | User roles changed |
| Skill | Skill created Skill copied Skill published Skill imported Skill deleted |
| Skill Online Learning | Skill updated as a result of Online Learning Document added to document set as a result of Online Learning Document deleted from document set as a result of Online Learning |
| Environment variables | Secret created Secret changed Secret deleted |
Filtering and Exporting Events
You can filter the list of events by skill, by user, and by period. Select a predefined period or set a custom one by specifying start and end dates. You can also export the filtered list of events in CSV format. The exported file contains the following columns:CorrelationId. The event identifier.SkillId. The identifier of the skill used to perform the action (if applicable).UserId. The identifier of the user who performed the action that triggered the event.PublishDate. The date and time of the event.EventType. The event type.Payload. Additional information about the event.
Only the first 10,000 events are exported to the file.
