1. Home
  2. Docs
  3. Security Compliance
  4. Comprehensive Security Co...
  5. Encrypted field logs in Desk365

Encrypted field logs in Desk365

Encrypted field logs in Desk365 help you maintain transparency, security, and compliance when handling sensitive data. With encrypted field logs, every action performed on encrypted ticket fields is recorded in one centralized place, making it easy to review who did what, when, and from where. 

This article explains what encrypted field logs are, what activities are tracked, how to use the filters, and the benefits of using logs for compliance and internal reviews.

What are encrypted field logs?

Encrypted field logs track all activity involving sensitive data — including PHI, PII, SSN, CVV, etc., within encrypted ticket fields across Desk365. These logs provide a detailed and centralized log trail to help organizations monitor access, changes, and configuration updates involving sensitive data. 

Each log entry captures: 

  • What activity was performed 
  • Where the activity occurred (ticket fields, forms, roles, etc.) 
  • Which encrypted field was affected 
  • Who performed the action 
  • When the action was performed 
  • The access source (IP address) 
  • The related ticket number 

All encrypted ticket field related activities are available in one single log view, giving administrators complete visibility without switching between multiple pages. 

You can access the encrypted field logs by navigating to Settings > Security > Encrypted Field Logs. 

encrypted-field-logs-desk365

Activities tracked in encrypted field logs

As mentioned above, encrypted field logs cover a wide range of encrypted ticket fields related actions across Desk365. Any activity that creates, modifies, exposes, restricts, or configures access to encrypted data is captured. 

1. Ticket fields

  • Creation of encrypted (PHI / ePHI / PII) ticket fields 
  • Editing encrypted field properties, including label, description, mandatory status, and tooltip 
  • Enabling or disabling encrypted ticket fields 
  • Deleting encrypted ticket fields 
  • Granting or revoking role-based access to the encrypted ticket field(s) 
  • Changing access levels for roles (View & Edit, View Only, or Hidden) for that specific encrypted ticket field
  • Restricting or hiding encrypted fields from specific roles during configuration or updates 
encrypted-ticket-field-desk365

2. Ticket forms

  • Adding encrypted fields (such as Patient Name, Patient ID, Insurance Details) to ticket forms
  • Removing encrypted fields from ticket forms
  • Updating field requirement rules to encrypted fields on ticket forms 
encrypted-ticket-field-added-to-ticket-form

3. Ticket details

  • Changes to ticket properties that involve encrypted fields
  • Updates made to encrypted data in ticket details 
encrypted-ticket-field-in-ticket-properties-desk365

4. Role permissions

Encrypted field logs track all changes made within Settings > Admin > Roles that affect access to encrypted ticket fields and compliance features. This includes, enabling or disabling compliance access for a role, which controls whether users in that role can create, edit, and manage encrypted ticket fields 

role-permissions-to-access-encryption-configuration

5. Closure rules

  • Creating closure rules that reference encrypted fields
  • Modifications to ticket closure rules that involve encrypted fields
  • Deleting closure rules that include encrypted fields 

Each activity is logged along with the IP address of the user performing the action, adding an extra layer of accountability and traceability. 

encrypted-ticket-field-in-closure-rules

Using filters to review encrypted field logs

Desk365 provides powerful filters so you can quickly narrow down log entries and find exactly what you need. 

Filter by date 

You can filter encrypted field logs by predefined ranges or select a custom period: 

  • Today
  • Yesterday
  • This week
  • Last 7 days
  • This month
  • Custom date range 

Filter by activity 

Choose where the activity occurred: 

  • Ticket fields
  • Ticket forms
  • Ticket details
  • Closure rules
  • Role permissions
  • Automation rules
  • Imports/Exports 

Filter by performed by 

Select one or more agents to see actions performed by specific users.

After selecting your filters, click ‘Apply’ to view the matching encrypted field log entries instantly. 

How encrypted field logs help your organization

  1. Compliance- Encrypted field logs provide a clear and tamper-proof record of all encrypted ticket field related activities, helping you meet security compliance requirements. 
  2. Improved security & accountability- With user names and IP addresses recorded, administrators can easily trace changes back to the source and identify unauthorized or unexpected activity. 
  3. Faster internal audits- Instead of manually tracking changes, you can quickly filter and review logs during internal audits or compliance reviews. 
  4. Better change management- Understand when encrypted fields were created, modified, or exposed, and ensure that access permissions align with your organization’s policies. 
  5. Centralized visibility- All encrypted ticket field related activities are available in a single audit log view, eliminating confusion and reducing administrative effort. 

Best practices

  • Regularly review encrypted field logs to monitor access and configuration changes 
  • Limit encrypted field access to only required roles 
  • Use date and agent filters during compliance reviews 
  • Retain the logs as part of your security and compliance documentation 

Encrypted field logs in Desk365 give you complete visibility into how protected information is handled across your helpdesk. With detailed activity tracking, powerful filters, and IP-level traceability, encrypted field logs help you stay compliant, secure, and in control of sensitive data. 

Require additional assistance? Please reach out to us at help@desk365.io

How can we help?