{"id":2558,"date":"2025-07-02T12:44:04","date_gmt":"2025-07-02T12:44:04","guid":{"rendered":"https:\/\/zecurit.com\/help\/docs\/asset-manager\/settings\/security-compliance\/activity-log\/"},"modified":"2025-07-04T07:04:15","modified_gmt":"2025-07-04T07:04:15","slug":"activity-log","status":"publish","type":"docs","link":"https:\/\/zecurit.com\/help\/asset-management\/settings\/security-compliance\/activity-log\/","title":{"rendered":"Activity Log"},"content":{"rendered":"\n<p>The <strong>Activity Log<\/strong> in Zecurit is a powerful auditing tool that tracks every key action taken within your organization\u2019s environment. It helps administrators monitor system activity, trace security events, and ensure accountability across users, modules, and operations.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Only Admins and Super Admins can view and access the Activity Log.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Key Capabilities<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Complete audit trail<\/strong> of user and system actions<\/li>\n\n\n\n<li>Real-time visibility into who did what, when, and from where<\/li>\n\n\n\n<li>Supports filtering by <strong>module<\/strong>, <strong>user<\/strong>, <strong>log type<\/strong>, and <strong>date range<\/strong><\/li>\n\n\n\n<li>Helps identify suspicious activities or unauthorized changes<\/li>\n\n\n\n<li>Logs can be exported in CSV\/PDF for offline review or compliance reports<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What is Logged?<\/h2>\n\n\n\n<p>Every log entry captures critical metadata for full traceability:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Field<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>Date &amp; Time<\/td><td>When the action occurred<\/td><\/tr><tr><td>User<\/td><td>The user who performed the action<\/td><\/tr><tr><td>Module<\/td><td>The feature area involved (e.g., Enrollment, Settings, Reports)<\/td><\/tr><tr><td>Remarks<\/td><td>Description of the action taken<\/td><\/tr><tr><td>IP Address<\/td><td>Public IP of the user device<\/td><\/tr><tr><td>Log Type<\/td><td>Info, Warning, Critical (based on severity)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Log Types and Severity<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Type<\/strong><\/th><th><strong>Meaning<\/strong><\/th><th><strong>Example<\/strong><\/th><\/tr><\/thead><tbody><tr><td><strong>Info<\/strong><\/td><td>Normal user actions and configuration updates<\/td><td>Role assignment, password change<\/td><\/tr><tr><td><strong>Warning<\/strong><\/td><td>Sensitive actions that may require attention<\/td><td>User deactivation, license deletion<\/td><\/tr><tr><td><strong>Critical<\/strong><\/td><td>Security-impacting or high-risk actions<\/td><td>MFA disabled, failed logins, agent uninstall<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Modules &amp; Examples<\/h2>\n\n\n\n<p>Below are common examples of actions logged by module:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Settings<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>User invited or deleted<\/li>\n\n\n\n<li>Role or group modified<\/li>\n\n\n\n<li>Rebranding or group changes<\/li>\n\n\n\n<li>Data cleanup setting updated<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Accounts<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>User activated\/deactivated<\/li>\n\n\n\n<li>Password reset or changed<\/li>\n\n\n\n<li>Email address changed<\/li>\n\n\n\n<li>MFA enabled\/disabled<\/li>\n\n\n\n<li>Login attempt failures and account locks<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Enrollment<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Agent installed or removed<\/li>\n\n\n\n<li>Connector added or deleted<\/li>\n\n\n\n<li>Domain added, edited, or removed<\/li>\n\n\n\n<li>Manual uninstall by end user<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Inventory<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Scheduled scan created\/paused\/edited<\/li>\n\n\n\n<li>On-demand scan initiated<\/li>\n\n\n\n<li>Software license added\/edited\/deleted<\/li>\n\n\n\n<li>Export of inventory data<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Reports<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Exported report file types (XLSX, CSV, PDF)<\/li>\n\n\n\n<li>Filters or date ranges used during export<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Filtering and Searching<\/h2>\n\n\n\n<p>Use filters to quickly locate specific events:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>By Module<\/strong>: Narrow down to actions within a feature<\/li>\n\n\n\n<li><strong>By Log Type<\/strong>: Focus on warnings or critical events<\/li>\n\n\n\n<li><strong>By Date Range<\/strong>: View activity within a specific period<\/li>\n\n\n\n<li><strong>By User<\/strong>: Track actions of a particular user or technician<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Exporting Logs<\/h2>\n\n\n\n<p>You can export logs in <strong>CSV<\/strong> or <strong>PDF<\/strong> format for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Internal audits<\/li>\n\n\n\n<li>Compliance evidence (GDPR, SOC2, etc.)<\/li>\n\n\n\n<li>Security investigations<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Security &amp; Governance<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>All agent uninstall actions, logins, and security setting changes are tagged as <strong>Critical<\/strong><\/li>\n\n\n\n<li>End-user actions (e.g., agent uninstall, password attempts) are also logged for accountability<\/li>\n\n\n\n<li>IP restrictions and session events are tracked in conjunction with user logs<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Best Practices<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regularly <strong>review the activity log<\/strong> to detect suspicious or unauthorized actions<\/li>\n\n\n\n<li>Use logs as evidence during <strong>compliance audits<\/strong> or <strong>security investigations<\/strong><\/li>\n\n\n\n<li><strong>Export monthly logs<\/strong> for backup or long-term record keeping<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>The Activity Log helps Zecurit customers maintain visibility, accountability, and control over their environment. It\u2019s a critical tool for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Audit trails<\/strong><\/li>\n\n\n\n<li><strong>Security monitoring<\/strong><\/li>\n\n\n\n<li><strong>Change tracking<\/strong><\/li>\n\n\n\n<li><strong>Compliance evidence<\/strong><\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Always monitor your Activity Log, especially after role changes, security setting modifications, or user onboarding.<\/p>\n<\/blockquote>\n\n\n\n<p><\/p>\n","protected":false},"featured_media":0,"parent":2553,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","doc_tag":[],"class_list":["post-2558","docs","type-docs","status-publish","hentry"],"comment_count":0,"_links":{"self":[{"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs\/2558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/types\/docs"}],"replies":[{"embeddable":true,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/comments?post=2558"}],"version-history":[{"count":2,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs\/2558\/revisions"}],"predecessor-version":[{"id":2625,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs\/2558\/revisions\/2625"}],"up":[{"embeddable":true,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs\/2553"}],"wp:attachment":[{"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/media?parent=2558"}],"wp:term":[{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/doc_tag?post=2558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}