Is sufficient detail contained in Operating System and application logs to support security incident investigations?

At a minimum, successful and failed login attempts, and changes to sensitive configuration settings and files?

book reader icon
1 Minute
facebook logo gray
linkedin logo gray
mail logo gray

Yes. We offer comprehensive logs for our user- and admin-accounts, and also keep logs for all access attempts to our web servers for two weeks, including all IP addresses used.

Access Logs

All login attempts (successful or not), instances of forgotten passwords and logouts can be viewed by account administrators.

Event Logs

Every action taken by any user can be viewed by account administrators, e.g. deleted QR Codes.

Last update 1 week ago