Skip to content
English - United States
  • There are no suggestions because the search field is empty.

How to check System Logs?

System Logs provide a record of user actions and system events within Helix. They are used to review activity history for compliance checks, investigations, and audits. System Logs capture who performed an action, what action was performed, where it occurred, and when it happened.

📍 Navigation

Control Panel → System Settings → System Logs


🔍 What You Can Do in System Logs

The System Logs screen allows you to:

  • Filter logs by date and time

  • View logged events in chronological order

  • Search logs (if available in your deployment)

  • Export or print logs (if enabled)


⏱️ Filter Logs by Period

Steps

  1. Select a Start Date

  2. Select an End Date

  3. Click Submit

Only logs within the selected time window are displayed.


📋 Viewing Log Results

Log results are displayed as a chronological list and typically include the following columns:

  • User (username)

  • Timestamp (Date & Time)
  • Description (Object/Module)
    Examples: Authentication, Patient Records, Medical Charts, Invoices, Signed consent, Roles, etc
  • Action / Event
    Examples: Create, Update, Delete, Login, Approve, etc

  • Results
    Success or Failure


🔎 Search Logs (If Available)

If search is enabled:

  • Enter part of a username, action, or entity name

  • The results update to match the entered criteria


📤 Export or Print Logs (If Enabled)

If export or print options are enabled in your system:

  • Logs can be exported to Excel or PDF

  • Exported logs can be used for investigations or audit records


🧠 Typical Use Cases

System Logs are commonly used to review:

  • Patient access history
    (who opened a patient file and when)

  • Configuration changes
    (roles, approvals, or system settings)

  • Financial actions
    (discount approvals, invoice voids, payroll postings)

  • Clinical actions
    (chart signing or prescription edits)


📌 Best Practices

  • Apply a specific date and time range before reviewing logs

  • When investigating, capture:

    • Date range

    • User(s)

    • Relevant record identifiers

  • Export logs only when required for review or escalation

  • For privacy, use filters instead of exporting full logs unless required.