Activity & Audit logs
Last updated
Was this helpful?
Last updated
Was this helpful?
The Activity Log provides a comprehensive view of user interactions within your defguard instance. This allows you to monitor user behavior, troubleshoot issues, and maintain an audit trail of important activities.
Activity log is available as a dedicated page in defguard core Web UI that's used to manage your instance.
To access it click the Activity log
button in the navbar.
Activity log page displays a chronological list of user-initiated events. By default most recent events are on top.
Each entry in the list contains following fields:
Date - timestamp of when an event has occurred
User - which user triggered the event
IP - location from which the action was performed
Event - brief description of the event
Module - which module given event belongs to
Device - device (or more specifically user agent) from which the action was performed
Events are grouped into modules based on the part of the system they are related to.
Currently there are four modules:
Defguard - operations performed in the core Web UI (e.g. adding users, modifying devices, managing groups etc.)
Client - actions performed by desktop client applications
VPN - events related to VPN clients (e.g. client connecting to a location)
By clicking the Filter
button above the list you can narrow down the displayed events based on following criteria:
Event
Module
Users
For each of those you can select multiple options.
Filtering by date can be done by clicking the Time range
button above the list.
By default the Activity log is sorted in reverse chronological order (most recent event on top).
To change the order you can click on the header of the Date
column.
You can also use the Search
input above the list to look for specific events.
You can search by:
Username
Module
Event
Device
The search is case-insensitive and will match partial text.
Note that filtering & searching are composable operations, so if you've already applied some filters the search will be performed only among those filtered events.
Access to the Activity log is controlled by user permissions.
Each user can always view their own activities (events triggered by themselves).
Additionally administrators can view events related to all users.
At the moment following events are tracked in the Activity log:
Defguard module
User login
User login failed
User MFA login
User MFA login failed
Recovery code used
User logout
User added
User modified
User removed
MFA disabled
MFA TOTP enabled
MFA TOTP disabled
MFA email enabled
MFA email disabled
MFA security key added
MFA security key removed
Device added
Device modified
Device removed
Network device added
Network device modified
Network device removed
Activity log stream device added
Activity log stream device modified
Activity log stream device removed
Client module
Enrollment module
VPN module
VPN client connected
VPN client disconnected
Enrollment - events related to the process
Please note, that enterprise version supports streaming of audit logs to e.