Articles in this section
Authenticate Emails with SPF, DKIM, and SenderID Auto forward your emails to Vtiger Managing User Profiles Automate Outgoing Emails in Email Settings Automation - Approvals Automation - Assignment Rules Set up Multi-path Workflows Creating a Scheduled Workflow Automation - Scheduler Creating a Workflow Webforms in Vtiger CRM Set up a Workflow Action to Create Event Set up a Workflow Action to Create Records Set up a Workflow Action to Create Task Set up a Workflow Action to Invoke Custom Function Set up a Workflow Action to Create an SMS Task Set up a Workflow Action to Send Mails Set up a Workflow Action to Update Fields Automation - Workflow Action - Webhook Automation - Workflows - Vtiger Expressions Configuration - Business Hours Configuration - Company Details Configuration - Consents Configuration - Customer Portal Maps in Vtiger CRM Configuration - Usage Details Configuring Encrypted Data Fields in Vtiger CRM Configure Picklist Dependencies Considerations for Deactivating Vtiger Users Control Fields and Record Displays using Configuration Editor Create Reminders for Records and Inbox Create a field of a Grid type Dealing with Currencies and Taxes Enable Desktop Notifications on Chrome Web Browsers Vtiger CRM Add-ons IMAP Configuration - 2-way sync between Vtiger and IMAP providers Setting up Autopay & Payment Gateways Inventory - Tax Management Inventory - Terms and Conditions Login to Vtiger on SSO SAML using ADFS Mailroom Functionality for Different Scenarios Manage Multiple Currencies Marketing and Sales - Deal to Project Mapping Marketing and Sales - Lead Conversion Data Mapping Marketing and Sales - Profile Scoring Module Management - Labels Editor Module Management - Module Numbering Configure My Preferences Feature My Preferences - Calendar Settings Tags in Vtiger My Preferences - Notification Preferences SAML Support in Vtiger CRM Vtiger Mailroom Settings - Configure Module Settings Settings - Create Dynamic Fields and Layouts Module Management - Creating a Relationship Between Modules Settings - Customize Records and Fields for your Business Settings - How to set email autoresponder to Webform submission? Settings - Left Menu Settings - Manage Global Picklists in Vtiger Settings - Set up your Support Team Settings - Start Up Page Settings - Working with Picklist Values Module Management - Module Builder Support - SLA Policies Troubleshooting Login Issues Add-Edit Unsubscribe Links in your Email Template User Management - Authentication User Management - Groups User Management - Login History User Management - Profiles User Management - Roles User Management - Settings Log User Management - Sharing Rules User Management - Users User Management - Vtiger Support Access Vtiger Buzz - Chrome Extension for Notifications Vtiger Implementation wizard Vtiger Language Support Configuring Websense Trackers Websense - Widgets Module Management - Module Layouts & Fields Generate and Manage Third-party App Passwords in Yahoo Configuring App Passwords for Gmail Outgoing Server and Yahoo Mail Configuration - Storage Guard Customizing your Self-Service Portal Theme Using CSS Styles Automation - SMS Reply Actions Adding Hidden Fields to a Webform Configuring Dependent Fields and Blocks for Modules Auto forward Emails from Microsoft Office 365 Adding Custom Module Login Page Customization Settings - Personalize Module Layouts Module Management - Modules Duplicate Prevention in Modules Formula Fields Creating Custom Filters Adding a local DNS Entry

User Management - Encrypted Field Access Logs

Learn how you can monitor the actions occurring on encrypted fields with the help of the Encrypted Field Access Logs.
R
Ruba
16 Nov, 2023 - Updated  1 year ago

Introduction

Have encrypted data stored on the CRM? 

Then we are sure you would like to monitor the actions performed on it. 

Why would you do that?

To ensure that the data is not misused and unauthorized users don’t access it.

 

Vtiger CRM’s encrypted field logs are records of all the actions that take place on encrypted fields.
 

What are encrypted fields

An encrypted field is used to store sensitive information about a contact or a lead, such as credit card numbers, CVV, bank account details, etc. You need to get consent from the contact or lead to store such information. 

To learn more about consents, click here.

Now that you know what encrypted fields are, let us learn how to create encrypted fields and view the access logs. Read on.

Creating an Encrypted Field

Note: You can create only up to five encrypted fields in a module.

 

Follow these steps to create encrypted fields:

  1. Log in to your CRM account.
  2. Click the User Menu on the top right corner of the CRM screen.
  3. Click Settings.
  4. Select Module Layouts & Fields under Module Management.
  5. Choose Contacts from the Select Module drop-down.
  6. Click the Detail View Layout tab.
  7. Click the +Add Custom Field button under any block you want to create it in. For example, under Basic Information, Address Details, etc. 
    • Note: You can also create a new block and add an encrypted field under it:
      1. Click the +Add Block button.
      2. Enter the block name.
      3. Choose the existing block after which you want to add the new block. 
      4. Click Save.
      5. Click the +Add Custom Field button in the newly created block.
  8. Select the field type as Text
    • Note: Encrypted fields can only be of type Text.
  9. Enter the field name under Label Name.
  10. Enter a default value for the field (optional).
  11. Enable the checkbox for Encrypt under Enable/Disable field properties.
  12. Type ENCRYPT in the textbox provided.
  13. Click the Encrypt button.
  14. Enter the number of characters in the encrypted field that must be visible to CRM users. 
  15. Click Save.

The value in the encrypted field is hidden from CRM users, except the users who have permission to view the value. 

To learn how to give users permission to view encrypted fields, click here.

 

Accessing the Encrypted Field Access Logs

You can access the log only if you are an Admin user.

Follow these steps to view the encrypted field access logs:

  1. Log in to your CRM account.
  2. Click the User Menu on the top right corner of the CRM screen.
  3. Click Settings.
  4. Look for the User Management section.
  5. Click Encrypted Field Access Logs.
 

When you land on the page, you will see the list of all the view and update logs.

Information available in the access logs

The table below shows the information that is displayed in the Encrypted Field Access log.

 

Information

Description

Field Name

The name of the encrypted field that was accessed.

Record Name

The name of the record that contains the encrypted field.

Module

The name of the module that contacts the encrypted field.

User Name

The name of the user who accessed the encrypted field.

Action

The action that was performed on the encrypted field:

  • Changed: This means the value of the field was changed.
  • Revealed: This means the value of the field was revealed or disclosed.

Performed On

The date and time at which the encrypted field was accessed.

Filtering the Access Logs

You can filter access logs to view desired information. Simply specify the data you want the CRM to filter and display! 

 

You can view access logs for a particular user name, dates, etc. For instance, if you want to know if the encrypted information on your CRM was accessed by anybody in the past week, you can filter the start and end dates of the week. This filters out the log and shows only the past week’s information.

 

Follow these steps to filter access log information:

  1. Log in to your CRM account.
  2. Click the User Menu on the top right corner of the CRM screen.
  3. Click Settings.
  4. Look for the User Management section.
  5. Click Encrypted Field Access Logs.
  6. Select an option from the space provided under the column names.
    1. For example, if you want to view the access logs for a particular user, select the user’s name from the User Name column. 
  7. Click the Search icon located on the left side under the column names.
 

The filtered logs are shown. 

Home Privacy Policy Terms of Service Security Center Policy & Legal Center Contact Us
© Copyright 2025 Vtiger. All rights reserved.
Powered by Vtiger
Facebook Twitter Linkedin Youtube