The below sections demonstrate how to control the compute resources, manage the software environments that are accessible to users and organizations in your deployment, and configure user access.
There are also a number of settings that control Domino’s behavior, which are outlined in the configuration documentation.
Log files are accessible through the “Logs” item under the “Advanced” menu in the Admin section.
By design, Domino will not log any secure pieces of information (e.g., passwords or environment variable values). Project names, user names, and file names are not considered secure, and will appear in logs.