This article applies to organisations with a Cloud setup, and those with a 'Hybrid' setup (both On-Premise Appliance and Cloud).
Log Levels are used to sort web requests by importance, to determine which requests are included in Logs such as the Real Time Log Viewer.
Log levels 1 and 2 include requests for images and supporting content required for a website to function.
The data for these requests is not usually useful for customers because they do not describe what actions the user took. Including these in Logs would make it more difficult to see the important details.
We only include Levels 3 and above in Logs. These are much more useful in figuring out what actions a user took, such as clicking a link or running a search.
- Level 3: A user has performed an action such as clicking a link.
- Level 4: A user has performed a more important action, such as requesting access to a blocked website.
- Level 5: A user action has generated a Safeguarding breach.
It is not possible to edit what is sorted into each level. If you believe something has been sorted incorrectly, let us know through our Feedback Form.