Security Monitoring
Using activity logs to detect suspicious behavior and protect the platform
Activity logs are your first line of defense against security threats. Monitor authentication events, detect suspicious patterns, and respond to potential attacks.
Why Security Monitoring Matters
Your platform contains sensitive business data and customer information. Activity logs help you:
- Detect brute-force attacks — Multiple failed login attempts
- Identify compromised accounts — Unusual activity patterns
- Track unauthorized access attempts — Failed logins from unknown locations
- Monitor suspicious behavior — Unusual deletion or modification patterns
- Meet compliance requirements — Maintain security audit trails
Monitoring Failed Login Attempts
Failed logins are often the first sign of a security threat.
Viewing Failed Login Statistics
- Navigate to Activity Logs > Analytics
- Scroll to the Authentication Statistics section
- Review the Failed Logins count
What to look for:
- Sudden spikes — Sharp increases in failed attempts
- Consistently high numbers — Ongoing attack attempts
- Patterns — Regular failed attempts at specific times
Investigating Failed Logins
When you notice suspicious failed login activity:
- Click View All Logs from the analytics dashboard
- Set Event filter to "Login Failed"
- Review the results table
For each failed login, check:
- Date/Time — When did it happen?
- User — Which account was targeted?
- IP Address — Where did the attempt come from?
Identifying Attack Patterns
Click on individual failed login records to see details:
Brute-Force Attack Signs:
- Multiple failed attempts from the same IP address
- Attempts targeting the same user account
- Rapid succession of attempts (minutes apart)
- Attempts from unusual geographic locations
Credential Stuffing Signs:
- Failed attempts across multiple user accounts
- Attempts from the same IP address
- Different usernames but similar patterns
Taking Action
If you identify a security threat:
- Block the IP address at your server/firewall level
- Contact affected users if their accounts were targeted
- Require password resets for compromised accounts
- Enable two-factor authentication for admin accounts
- Monitor ongoing to ensure the threat has stopped
Monitoring Successful Logins
Track successful authentications to spot compromised accounts.
Unusual Login Patterns
- Navigate to Activity Logs > View All Logs
- Set Event filter to "Login"
- Review recent successful logins
Red flags:
- Logins from unexpected locations (check IP address)
- Logins at unusual times (middle of the night)
- Multiple logins in rapid succession
- Logins from different locations within minutes
Investigating Suspicious Logins
Click on a login record to view:
- IP Address — Does it match the user's normal location?
- User Agent — Is the device/browser familiar?
- Time — Is this a normal time for this user?
If a login looks suspicious:
- Contact the user to verify it was them
- If unauthorized, reset their password immediately
- Review their recent activity for unauthorized changes
Monitoring Deletion Activity
Unusual deletion patterns can indicate malicious behavior or compromised accounts.
Tracking Deletions
- Navigate to Activity Logs > View All Logs
- Set Event filter to "Deleted"
- Review what's being deleted
Warning signs:
- Mass deletions — Many records deleted in a short time
- Critical data — Important cards, rewards, or members deleted
- Unusual users — Deletions by accounts that don't normally delete
- After-hours activity — Deletions at odd times
Setting Up Regular Security Checks
Create a routine security monitoring schedule:
Daily Checks (5 minutes)
- Open Activity Logs > Analytics
- Review Authentication Statistics
- Check for spikes in failed logins
- Review Recent Activity for anything unusual
Weekly Checks (15 minutes)
- Review Failed Logins for the past 7 days
- Check Most Active Users for unexpected accounts
- Filter deletions and review critical records
- Export logs for compliance records
Monthly Checks (30 minutes)
- Analyze Activity Timeline for unusual patterns
- Review User Types Breakdown for anomalies
- Check all failed logins from the past month
- Generate security report for stakeholders
Best Practices
| Practice | Description |
|---|---|
| Enable IP Logging | Ensure accurate IP capture for identifying attack sources |
| Monitor Admin Accounts | Admin accounts have the most power—watch closely |
| Set Up Alerts | Use external monitoring for threshold-based alerts |
| Regular Exports | Export logs monthly for long-term analysis |
| Educate Users | Train on strong passwords and phishing recognition |
| Two-Factor Authentication | Require 2FA for all admin accounts |
Related Topics
- Activity Logs Overview — Introduction to activity logging
- Activity Analytics — Visual insights and metrics
- Viewing Logs — Search and filter details