Application logs

The Application Logs section is an audit tool that allows you to monitor user activity within the web application.

With logs, you have full control over security and change history. You can check who logged into the application and when, who made configuration changes, added new users, or edited settings.

Search and Filters

To quickly find the event you are interested in, use the filters available at the top of the screen:

  • Select range: Allows you to specify the time period for which you want to view the event history (default is the last month).

  • Event type: A drop-down list allowing you to narrow down results to specific actions. Example event types visible in the system include:

    • Logged into panel: Record of successful authorizations in the application.

    • User added: Creating a new access account.

    • User removed: Revoking access to the application.

    • User rights edited: Changes in access levels (roles).

  • Users: Allows you to view the activity of a selected web application user (e.g., to verify the actions of a specific employee).

Event List

The results table presents a chronological list of all actions meeting the search criteria. Each row contains key information:

  • Time and date: The exact time the event occurred.

  • Section: The area of the web application where the action was performed (e.g., Account, Administration).

  • Event: The name of the action performed (e.g., Login to panel).

  • User: The login of the person who performed the action.

  • IP: The IP address of the device from which the action was performed. This is crucial for security and verifying unauthorized access.

Event Details

Each row in the table is interactive. By clicking on a row (or the arrow on the right), you can expand the details to see the exact system message regarding the operation (e.g., login confirmation for a specific login).

Last updated