12.2 Watermark Logs
12.2.1 Document Watermark Logs
Document watermark logs record client operations for adding or removing watermarks on documents. By reviewing these logs, administrators can track user actions such as document sharing or local storage, providing reliable evidence for investigating potential data leaks and enhancing document security.
To view the logs, go to Menu → Watermark → Document Watermark Logs. The logged attributes include:
Attribute Name |
Description |
Type |
The type of operation that triggered the policy; includes copying to removable drives, copying to network drives, IM file transfer, IM image transfer, IM screenshot, sending emails, uploading, creating, modifying, decrypting, manual watermark addition, manual watermark removal, external removal of watermarks, copying to local drives. |
Watermark ID |
The ID of the applied watermark. |
Document ID |
A unique identifier automatically added when a watermark is applied to a document. |
File Name |
The name of the file. |
File Extension |
The file's extension. |
File Size |
The size of the file. |
Path |
Source and target paths of the file. |
Watermark Template |
The watermark template used when adding a watermark; empty if a watermark was removed. |
Description |
Detailed information about the operation or failure, such as the IM tool used for sharing or the sender/recipient info for email transmission. |
Document watermark logs can be queried using the following criteria:
Query Criteria |
Description |
ID |
The watermark ID of the document. |
Watermark Template |
The watermark template used when adding the watermark; default is all. |
Operation Type |
The type of operation that triggered the policy; includes: copy to removable drive, copy to network drive, IM file transfer, IM image transfer, IM screenshot, send email, upload, create, modify, decrypt, manual add watermark, manual remove watermark, external remove watermark, copy to local drive, save as. |
Document ID |
A unique document identifier added when the watermark is applied; can be used to query all logs for that document. |
Size |
File size range. |
Source |
File |
The type of the source document. When searching by type, you can select from the default types or manually add a type name. |
Path |
The path where the source file is located. |
Target |
File |
The type of the target document. When searching by type, you can select from the default list or manually add a type name. |
Path |
The location of the target file. |
Description |
Detailed information about the operation. |
Has Backup File |
By default, this is unchecked. Queries all logs (including those with or without backup files). Check this box to query only logs that have backup files. |
12.2.2 Document Tracking Log
The document tracking log records the tracking information added to documents by the client. By reviewing these logs, administrators can identify user actions such as external transfers or local storage of documents. This provides reliable evidence for investigating data leaks and enhances overall document security management.
Select the menu "Watermark -> Document Tracking Log" to view the document tracking logs. The log records include the following information:
Attribute Name |
Description |
Operation Type |
Type of operation that triggered the policy; includes copy to removable drive, copy to network drive, IM file transfer, IM image transfer, send email, upload, create, modify, decrypt, manual watermark add, manual watermark remove, scan, copy to local drive, Save As. |
Document ID |
Unique identifier of the document. |
Tracking ID |
Identifier for each tracking action. |
File Name |
Name of the file. |
File Extension |
File extension. |
File Size |
Size of the file. |
Path |
Source and destination paths of the file. |
Tracking Information |
Information added to the document during this operation. |
Previous Tracking Info |
Information added to the document in the previous operation. |
Description |
Detailed information about the operation or failure, such as the IM tool used for transfer or the sender/recipient details when sending emails. |
The document circulation log can be queried using the following criteria:
Query Criteria |
Description |
ID |
Circulation log ID of the document |
Circulation Information |
The added circulation information |
Previous Circulation Info |
The circulation information added in the previous operation |
Operation Type |
Type of action that triggered the policy; includes copying to removable drives, copying to network drives, IM file transfer, IM image transfer, sending emails, uploads, creation, modification, decryption, manual watermark addition, manual watermark removal, scanning, copying to local drives, Save As |
Document ID |
Unique identifier assigned to the document when circulation information is added; querying by this ID retrieves all logs of the document |
Size |
File size range |
Source |
File |
Type of the source document; when searching by type, you can choose from the default types or manually add a type name. |
Path |
Path of the source file. |
Target |
File |
Type of the target document; when searching by type, you can choose from the default types or manually add a type name. |
Path |
Path of the target file. |
Description |
Detailed information about the operation. |
Has Backup File |
By default, unchecked. When checked, only logs with backup files are queried; if unchecked, all logs are queried. |
Don't see what you're looking for?