Log Managment
The Log Management screen is designed to monitor, report, and analyze all user movements, system events, and security audits on the D2M portal from a central point. The Log Management panel provides a detailed list of who performed which operation, when, via which IP address, and the result of that operation. This allows unauthorized attempts or operational errors on the system to be detected in real-time.
Filtering Options
The Filter area at the top of the screen allows you to focus on specific events within large datasets:
Log Type: Select the category of events you wish to monitor
All: Lists all logs.
Device Logs: Shows device movements such as allowing or blocking mobile devices
Login Logs: Lists user login and logout attempts, including Two-Factor Authentication (2FA)
Event Logs: Covers other operational events throughout the system.
Start/End Date: Used to view records covering a specific time interval.
Search: Used to apply the selected filters.
Log Data Definitions
The table structure records each event with the following parameters:
Column Name
Description
Timestamp
Full date and time information of when the operation occurred
Username
Identity of the user or administrator performing the action
IP Address
Shows the network address through which the operation reached the system12.
Event Title
The short name of the action performed (e.g., User Login SMS, Block Device, Allow Device)
Event Description
The success status (Success/Fail) and technical result of the operation
Visual Status Indicators
D2M uses color coding so you can quickly distinguish the criticality level of events:
Green / Turquoise Rows (Success): Indicates that the operation was completed successfully. Examples include logins made with the correct password and SMS code or successful device approvals.
Red Rows (Fail): Represents an erroneous or blocked attempt. These are typically triggered by wrong passwords, incorrect SMS codes, or unauthorized access attempts.

Last updated