Logs and analysis
Introduction to logs and analysis
main administratormenu Analysis
In menu Analysis, the following items are available:
- Security checks - check if end users only have access to the data they are allowed to see. See Security checks.
- Session log - an overview of all sessions for all users. See Session log.
- Session analysis - a pivot table to analyze all user sessions. See Session analysis.
- Two-factor log - an overview of the use of two-factor authentication for all users. See Two-factor log.
- Action analysis - a pivot table to analyze all actions.
- Recommendations - user preference suggestions based on the user logs. See Analyze user behavior and apply recommendations.
- Scheduled system flows - to check the status of the scheduled system flows for your applications. see System flows.
- Notifications - push notifications to users. See Push a notification.
- Personal access tokens - an overview of all personal access tokens, and the possibility to revoke them. See Personal access tokens.