Skip to main content

User Activity Monitoring

Track user actions, audit security events, and maintain compliance with comprehensive activity logs.

Compliance Ready

User activity monitoring helps meet audit requirements for SOC 2, HIPAA, and PCI DSS.


Why Monitor User Activity?

PurposeDescription
SecurityDetect unauthorized access and suspicious behavior
ComplianceMeet audit requirements for SOC 2, HIPAA, PCI DSS
InvestigationReconstruct incident timelines and root cause analysis

What Gets Logged?

Authentication Events

All authentication-related activities are logged:

EventDetails Captured
Login attemptsSuccess/failure, IP, timestamp
MFA eventsSetup, modifications, verification
Password changesReset requests, completions
SessionsCreation, termination, expiry
LockoutsTrigger reason, unlock events

Viewing Activity Logs

Step 1: Access the Activity Log

Navigate to the Activity Log page to view all user actions.

Navigation Paths:

RolePath
All UsersProfile → Activity Log
AdministratorSettings → Security → Audit Log

Exporting Activity Logs

CSV Export

Export filtered activity logs to CSV format for spreadsheet analysis.

Path: Activity Log → Export → CSV

Use Cases:

  • Spreadsheet analysis
  • Import into other systems
  • Custom reporting

Activity Log Retention

Subscription TierRetention PeriodExport Available
Small Business90 days✅ Yes
Medium Business1 year✅ Yes
Enterprise7 years (configurable)✅ Yes + API
Compliance Tip

Regularly export and archive activity logs to meet long-term compliance requirements (e.g., SOX, GDPR, HIPAA).


Activity-Based Alerts

Configure alerts for suspicious or important user activities:

Authentication Alerts

AlertTrigger
Failed Login Attempts5 failures in 15 minutes
New Device LoginLogin from unrecognized device
Geographic AnomalyLogin from unusual location
Concurrent SessionsMultiple simultaneous logins

Best Practices

Review Schedule

RoleFrequencyFocus
AdministratorWeeklyAll activity, config changes
Security AnalystDailySecurity operations, anomalies
ComplianceMonthlyAudit trail completeness
📝 Activity Monitoring Checklist
  • Configure activity-based alerts
  • Set up scheduled exports
  • Establish review schedule
  • Document retention requirements
  • Test export and archive process
  • Correlate with security events
  • Train team on log analysis

What's Next?

GuideDescription
Access Control PoliciesConfigure IP and time-based restrictions
Multi-Factor AuthenticationEnhance security with MFA
Generating ReportsCreate compliance reports