Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Live Search
spaceKeyDOC
placeholderSearch

...

Field

Meaning

Date from ... to

In this area, you can specify which period of time you wish to search.

Clicking on the Calendar icon to the right of the date will open a dialog containing a calendar, and clicking on the Cancel icon will delete all entries.

Account

In the text field, you can enter the user account whose logins you want to search for.

Access

In the drop-down list, you can set which accesses are to be displayed: all accesses, only accesses granted or only accesses denied.

Number of rows per page

In this field, you can increase or reduce the number of records that will be displayed on one page of the login log.

Login

Column title

Meaning

Account

The user account

IP address

The IP address from which the staff member logged in.

Please note: Certain network constellations may allow only restricted determination and storage of hostnames and IP addresses.

Access

This field indicates whether access was granted or denied.

Error message

If the access was denied, the corresponding rejection message from the system will be displayed in this field.

Date

The date and time of the login attempt.

Functions

Detailed view of the respective entry with all identification data including request parameters.

Admin Log

The Admin log tab not only provides a detailed log of the actions executed by users in the system, but also allows an insight into the performance in the installation’s admin area. Similar to the login log, you can click on a column title in the “Matching log entries” area to sort the entries by the respective column. This function makes it easier to search, e.g. for actions in a specific module. If you click on the icon in the “Functions” column, you can also display a detail view of the respective entry with all identification data, including request parameters.

...

On installations with the SMS module enabled, you‘ll find SMS Report under Options → SMS admin. This functionality gives you a detailed list of all SMS sent by EFS to the provider along with the initial response received from the SMS provider. 

File exchange

After logging in at http://www.your-domain.com/fm/ or opening the File exchange menu, you will be directed to an overview of the files of all exchange teams for which you have at least read rights. The already familiar EFS search functions allow to handle extensive file lists easily. The. You have a simple and an advanced search. In the case of the advanced search, you can search for the status, the team or the time period in which the file was uploaded in addition to the keyword search.

The View function for restricting the table is also available.

...

The following table explains the contents of the overview list in detail:

Column heading

Meaning

Date

Date when file was stored on server

Title

User-defined file identification within the exchange platform

Comment

Explanatory comment

File name

Actual file identification, such as example.doc.

Size

File size. If the file is smaller than 1.024 KB, the size is stated in kilobytes, otherwise in megabytes. If the file is smaller than 1.024 bytes, the size is stated in bytes.

Author

The staff member who uploaded the file.

Security

If a password has been set when uploading the file, this field contains an input field where you have to enter the password before downloading the file.

StatusStatus 

Indication of status. Possible values: “Active”, “Obsolete”, “Locked”.

Team name

Name of staff team possessing full rights to the file.

...

If the uploaded files are frequently revised and replaced with new versions, assigning a file status will help you keep track. There are three possible file statuses to describe the degree of currentness and accessibility of a file: “Active”, “Obsolete”, “Locked”.

File statuses

Status

Meaning

Active

The file is up-to-date and may be downloaded by every team member. Its status may be changed by members holding special rights and by the author of this file.

Obsolete

The file is no longer up-to-date but may still be downloaded by every team member. Its status may be changed by members holding special rights and by the author of this file.

Locked

The file has been locked. The file cannot be downloaded until the status has been changed to “Active” or “Obsolete” by the user who initiated the lock.

...

  • Locate the file in the file list and tick the corresponding checkbox in the “Selection” column.

  • Select the “Delete” action from the drop-down list.

  • Click on Execute.

  • Acknowledge the confirmation prompt by clicking on OK.

  • The file will be deleted.

Info

EFS always retains a backup copy of deleted files. If you wish to restore an accidentally deleted file, please contact QuestBack support.

ACL rights

...

There are usually a number of staff working in EFS installations, often in larger staff groups.

  • In addition to the project management, large numbers of additional users are often involved in large survey projects or the administration of panels. There are, for example, users that specialize in questionnaire programming, while other users are responsible for the evaluation of questionnaires.

  • In collective installations, users from different QuestBack clients work completely separately on their respective projects.

  • Some users may not be granted access to the admin area. Instead, separate logins such as EFS Survey Status and EFS Translator Interface provide restricted access to the information and functions their work requires.

EFS allows you to effectively configure and control the access rights of all these staff

  • Instead of configuring the access rights for each individual user, you define teams: These reflect the respective rights and duties of entire user groups with identical responsibilities. Subsequently, you allocate the actual users to the user roles.

  • The various ways of accessing and changing information and functions are mapped in a dedicated rights system. Thus, you can not only define which information and functions a team may generally access, but also which individual objects (e.g. specific projects)

...