Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.abbyy.com/llms.txt

Use this file to discover all available pages before exploring further.

The Security Log chronologically records tenant configuration changes, user activities, and other admin-level events. It does not include business transaction events — those appear in the Transactions section of the Skill Monitor. To open the Security Log, click Configuration and select the Security Log tab. Events are displayed as a table with the following columns:
  • The date and time of the event
  • The user who performed the action that triggered the event
  • The event type
  • The name of the skill used to perform the action (if applicable)
  • Additional information about the event
The following table lists all tracked event types by scope:
ScopeRelated events
UsersUser roles changed
SkillSkill created
Skill copied
Skill published
Skill imported
Skill deleted
Skill Online LearningSkill updated as a result of Online Learning
Document added to document set as a result of Online Learning
Document deleted from document set as a result of Online Learning
Environment variablesSecret created
Secret changed
Secret deleted

Filtering and Exporting Events

You can filter the list of events by skill, by user, and by period. Select a predefined period or set a custom one by specifying start and end dates. You can also export the filtered list of events in CSV format. The exported file contains the following columns:
  • CorrelationId. The event identifier.
  • SkillId. The identifier of the skill used to perform the action (if applicable).
  • UserId. The identifier of the user who performed the action that triggered the event.
  • PublishDate. The date and time of the event.
  • EventType. The event type.
  • Payload. Additional information about the event.
Only the first 10,000 events are exported to the file.