- Knowledge base
- Users
- Authentication & security
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How does the activity log work?
The activity log, or audit log, automatically logs user activities like logins, creation and deletion of items. The activity log can store information for, 30 (default), 60 or 90 days. To review the activity log, please follow this instruction.
- log in to Security Center.
- Click Users in the menu to the right.
- Click Activity log.
- Done!