However, there was no log of who had made these changes. The system usually tracked every access and modification, but in this case, it seemed as though someone had managed to bypass the security measures.