- Created by Admin, last modified by Peter Posse on 21. Mar 2023
Sensitive card data
PCI DSS requires that every user access to sensitive credit card data must be able to be retraced for security reasons. Computop Analytics therefore does not save each action by the user, but rather only the actions relevant to security, such as data access.
The tab "Administration → User log" allows you to search for user actions relevant to security within Computop Analytics. This allows you to set filters within Computop Analytics for the period, the user, and the user action relevant to security. You can export the search results as an Excel file.
If you wish to grant several persons access to Computop Analytics, you can create new users in the user management.
Overview of the search criteria
- "Period" selection field
- "Operation characteristics" selection field
- "Search and Filter" button
When you click in the input fields for the date, a calendar opens in which you can select a date. When you click in the input fields for the time, you can define a time for the search.Activating the "Period" selection field
Activating the "Operation characteristics" selection field
You can select two different operation characteristics: User, and action relevant to security.
Selecting users
You can either select all users, or a specific user.
Selecting an action
Every action relevant to security carried out by a user is saved. Descriptions of the individual types of actions relevant to security can be found in the "Actions relevant to security" table below.
Action | Description |
---|---|
Cancel | Operation cancelled |
Capture | Capture added to an operation |
Credit | Credit added to an operation |
Delete | Information removed |
Download | Batch file or settlement file downloaded |
Gdpr-delete | Personal data deleted |
Insert | Information added |
Login | User logged in |
Logout | User logged out |
Order | Upcoming operation created |
Payment | Operation created |
Query | Operations queried |
Reverse | Operation cancelled |
Sale | Operation (authorisation and payment) carried out |
Update | Information changed |
Upload | Batch files or black lists uploaded |
View | Details of an operation displayed |
You can export the search results as an Excel file for further processing. Proceed as follows to export the search results: → The application verifies the values entered. If the values are invalid, a message showing the reason why will appear in red. If the values are valid, the search results will be shown. 3. Click on the "Export " button. → The search results are issued as a CSV file ready to download.Exporting search results
Application Button
The button at the bottom allows you to jump to the corresponding page within the application. You must be logged in to jump to the corresponding page within the application.
On this page
In this section
-
Page:
-
Page:
-
Page:
-
Page:
-
Page: