The Activity Logs feature provides administrators with a complete audit trail of user login activity across the firm. It helps monitor:
Login attempts
Device and browser information
IP addresses
Geographic location
Suspicious or unusual access patterns
This module is essential for maintaining security, compliance, and visibility into user authentication behavior.
The Activity Logs screen allows administrators to:
View all login events for all users
Identify unusual or unauthorized access
Review IP address details
Review geographic location details
Mark login events as suspicious
Strengthen security by monitoring patterns
The list view displays all recorded login events.
User Name
Email
Login Date & Time
IP Address
Location (City, Country)
Device / Browser
Status (Successful / Failed)
Actions (View IP Details, View Location Details, Mark as Suspicious)
Search by user
Filter by date range
Filter by status (Success / Failed / Suspicious)
Review detailed event information
Each login event includes three important security actions:
Provides technical information about the IP address used during the login attempt.
IP Address
ISP / Network Provider
IP Type (Residential, Corporate, VPN, Proxy)
Risk Indicators (if applicable)
Previous activity from this IP
Helps identify unknown or risky IP addresses
Detects VPN or proxy usage
Supports security investigations
Shows the geographic location associated with the login event.
City
Region / State
Country
Approximate coordinates (if available)
Map preview (if supported)
Previous logins from this location
Detects unusual geographic access
Helps identify compromised accounts
Supports compliance and audit requirements
Allows administrators to flag a login event as suspicious for internal review or security escalation.
The event is labeled Suspicious in the logs
It may trigger internal alerts (depending on system configuration)
Admins can review patterns of suspicious activity
Helps track potential unauthorized access attempts
Login from an unknown country
Login from an unrecognized device
Multiple failed attempts
Login outside normal working hours
IP flagged as high‑risk
The Activity Logs module supports:
Identify unauthorized access attempts quickly.
Maintain audit trails for regulatory requirements.
Spot unusual login patterns or suspicious IPs.
Track who accessed the system and when.
Provide evidence for internal investigations.
To maintain a secure environment:
Review logs weekly for unusual activity
Enable MFA for all high‑risk roles
Mark suspicious events immediately
Investigate unknown IPs or locations
Deactivate compromised accounts promptly
Document internal security procedures
The Activity Logs feature provides a complete, centralized audit trail of all user login activity. With tools to view IP details, location details, and mark suspicious events, it helps administrators maintain a secure, compliant, and well‑monitored environment.
This module is essential for protecting firm data and ensuring responsible system access.