Solved

find goldmine deleted contact

Posted on 2006-11-29
1
500 Views
Last Modified: 2013-11-24
It seems some how one of our contacts has been delted and no one knows how. As far as I can tell only 3 people have the rights to delete a contact, but I don't know where in the logs to look to see who , when, and how it was done. Is there a way to get that information?
0
Comment
Question by:kevlause
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 13

Accepted Solution

by:
TommyTupa earned 500 total points
ID: 18042989
This can be accomplished by querying the conttlog table.

The following query will give you all deletes sorted by user:
select * from conttlog where fieldname='zzzdel' order by userid

If you want to search a particular table use this query:
select * from conttlog where fieldname='zzzdel' and tableid = '&' order by userid.

Table names:
& - Contact1
' - Contact2
* - ContGrps
) - ContHist
( - ContSupp
% - Conttlog
0 - ContUDef

The FRECID column in conttlog refers to the recid of the corresponding table.

The syncstamp and logstamp refer to the date\time of the change.  You can convert syncstamp and logstamp to actual values by entering the Goldsync Administration Center, Right-Clicking on 'Servers', and selecting 'Date\Time Stamp Conversion'.


HTH,
TT

0

Featured Post

Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I showed you how to use console view (HERE (http://www.experts-exchange.com/articles/18379/Getting-Started-and-Using-the-Salesforce-com-Console.html)) -– but how do you set it up on the admin side of Salesforce? Note that you have to have Admin leve…
These days socially coordinated efforts have turned into a critical requirement for enterprises.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…
Suggested Courses

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question