Articles in this section
Authenticate Emails with SPF, DKIM, and SenderID Auto-forwarding your emails to Vtiger Automate Outgoing Emails in Email Settings Automation - Approvals Automation - Assignment Rules Automation - Multi-path Workflows Automation - Scheduled Workflows Automation - Scheduler Automation - Standard Workflows Automation - Webforms Automation - Workflow Action - Create Event Automation - Workflow Action - Create Records Automation - Workflow Action - Create Task Automation - Workflow Action - Invoke Custom Function Automation - Workflow Action - SMS Task Automation - Workflow Action - Send Mail Automation - Workflow Action - Update Fields Automation - Workflow Action - Webhook Automation - Workflows - Vtiger Expressions Configuration - Business Hours Configuration - Company Details Configuration - Consents Configuration - Customer Portal Configuration - Maps Configuration - Usage Details Configure Encrypted data fields in Vtiger CRM Configure Picklist Dependencies Considerations for Deactivating Vtiger Users Control Fields and Record Displays using Configuration Editor Create Reminders for Records and Inbox Create a field of a Grid type Customize your self-service portal theme using CSS styles Dealing with Currencies and Taxes Enable Desktop Notifications on Chrome Web Browsers Extensions - Extension Store IMAP Configuration - 2-way sync between Vtiger and IMAP providers Inventory - Payments and Subscriptions Inventory - Tax Management Inventory - Terms and Conditions Login to Vtiger on SSO SAML using ADFS Mailroom Functionality in Different Scenarios Manage Multiple Currencies Marketing & Sales - Forecast and Quota Settings Marketing & Sales - Pipelines and Stages Marketing and Sales - Deal to Project Mapping Marketing and Sales - Lead Conversion Data Mapping Marketing and Sales - Profile Scoring Module Management - Labels Editor Module Management - Module Numbering My Preferences My Preferences - Calendar Settings My Preferences - My Tags My Preferences - Notification Preferences SAML Support in Vtiger CRM Set up Mailroom Settings - Configure Module Settings Settings - Create Dynamic Fields and Layouts Module Management - Creating a Relationship Between Modules Settings - Customize Records and Fields for your Business Settings - How to set email autoresponder to Webform submission? Settings - Left Menu Settings - Manage Global Picklists in Vtiger Settings - Set up your Support Team Settings - Start Up Page Settings - Working with Picklist Values Module Management - Module Builder Support - SLA Policies Troubleshooting Login Issues Unsubscribe your Email User Management - Authentication User Management - Groups User Management - Login History User Management - Profiles User Management - Roles User Management - Settings Log User Management - Sharing Rules User Management - Users User Management - Vtiger Support Access Vtiger Buzz - Chrome Extension for Notifications Vtiger Implementation wizard Vtiger Language Support Websense - Trackers Websense - Widgets Configuration - Storage Guard Adding a local DNS Entry Adding Additional Hidden Fields to a Webform Configuring Dependent Fields and Blocks for Modules Duplicate Prevention in Modules Module Management - Modules Module Management - Module Layouts & Fields

User Management - Encrypted Field Access Logs

Learn how you can monitor the actions occurring on encrypted fields with the help of the Encrypted Field Access Logs
S
Sabqat Ruba
28 Oct, 2020 - Updated 10 months ago

Introduction

Have encrypted data stored on the CRM? 

Then we are sure you would like to monitor the actions performed on it. 

Why would you do that?

To ensure that the data is not misused and unauthorized users don’t access it.

 

Vtiger CRM’s encrypted field logs are records of all the actions that take place on encrypted fields.

What are encrypted fields

An encrypted field is used to store sensitive information about a contact or a lead, such as credit card numbers, CVV, bank account details, etc. You need to get consent from the contact or lead to store such information. 

To learn more about consents, click here.

 

Now that you know what encrypted fields are, let us learn how to create encrypted fields and view the access logs. Read on.

Creating an Encrypted Field

Note: You can create only up to five encrypted fields in a module.

 

Follow these steps to create encrypted fields:

  1. Click the User Menu on the top right corner of the screen.
  2. Click the Settings button.
  3. Select Module Layouts & Fields under Module Management.
  4. Choose Contacts from the Select Module drop-down.
  5. Click the Detail View Layout tab.
  6. Click the +Add Custom Field button under any block you want to create it in. For example, under Basic Information, Address Details, etc. 
    • Note: You can also create a new block and add an encrypted field under it:
      1. Click the +Add Block button.
      2. Enter the block name.
      3. Choose the existing block after which you want to add the new block. 
      4. Click Save.
      5. Click the +Add Custom Field button in the newly created block.
  7. Select the field type as Text
    • Note: Encrypted fields can only be of type Text.
  8. Enter the field name under Label Name.
  9. Enter a default value for the field (optional).
  10. Enable the checkbox for Encrypt under Enable/Disable field properties.
  11. Type ENCRYPT in the textbox provided.
  12. Click the Encrypt button.
  13. Enter the number of characters in the encrypted field that must be visible to CRM users. 
  14. Click Save.
 

The value in the encrypted field is hidden from CRM users, except the users who have permission to view the value. 

To learn how to give users permission to view encrypted fields, click here.

 

Accessing the Encrypted Field Access Logs

You can access the log only if you are an Admin user.

Follow these steps to view the encrypted field access logs:

  1. Click the User Menu on the top right corner of the screen.
  2. Click the Settings button.
  3. Look for the User Management section.
  4. Click Encrypted Field Access Logs.
 

When you land on the page, you will see the list of all the view and update logs.

The 

Information available in the access logs

The table below shows the information that is displayed in the Encrypted Field Access log.

 

Information

Description

Field Name

The name of the encrypted field that was accessed.

Record Name

The name of the record that contains the encrypted field.

Module

The name of the module that contacts the encrypted field.

User Name

The name of the user who accessed the encrypted field.

Action

The action that was performed on the encrypted field:

  • Changed: This means the value of the field was changed.
  • Revealed: This means the value of the field was revealed or disclosed.

Performed On

The date and time at which the encrypted field was accessed.

Filtering the Access Logs

You can filter access logs to view desired information. Simply specify the data you want the CRM to filter and display! 

 

You can view access logs for a particular user name, dates, etc. For instance, if you want to know if the encrypted information on your CRM was accessed by anybody in the past week, you can filter the start and end dates of the week. This filters out the log and shows only the past week’s information.

 

Follow these steps to filter access log information:

  1. Click the User Menu on the top right corner of the screen.
  2. Click the Settings button.
  3. Look for the User Management section.
  4. Click Encrypted Field Access Logs.
  5. Select an option from the space provided under the column names.
    1. For example, if you want to view the access logs for a particular user, select the user’s name from the User Name column. 
  6. Click the Search icon located on the left side under the column names.
 

The filtered logs are shown. 

Home Privacy Policy Terms of Service Security Center Policy & Legal Center Contact Us
© Copyright 2021 Vtiger. All rights reserved.
Powered by Vtiger
Facebook Twitter Linkedin Youtube