How do I see my account Audit Trails (Activity Logs)?
My compliance standard requires me to review audit trails or activity logs. Where can I find my Encyro account activity logs? What will see in my audit trails?
Audit trails help you review your account activity to detect suspicious account access, such as at unexpected times or from unexpected locations.
Your audit logs will show you the following information:
- When? The time at which the logged activity occurred. This is displayed in the local time zone of the computer or device you are using to access the activity logs.
- Device: This indicates if this is the first device you have used, or a second, third, or subsequent device. The device number may change in some situations even if you use the same device such as when you use a new browser, re-install the operating system or certain browsers, use a private browsing window, or delete your browser cookies.
- Device Type: This indicates some information about the type of device used to access your account, such as if its a Windows or Mac device and the browser used. This can reveal if your account was being accessed from an an unexpected device.
- Location: The logs display the country and IP address. For privacy reasons, we do not automatically convert your IP address to fine grained location such as your street address, but in case you suspect an unexpected activity, please feel free to contact us and we can help look up a more exact location for that IP address. Please do note that IP address based location may not always be correct.
- Event (and notes): This indicates the activity that happened, such as a login, change of logo etc. Some events may have notes, such as when the event is that your business logo was changed, then the notes may show the file name of the image file that was uploaded.
How To Access
To access your audit logs, your compliance settings must be enabled (this requires a Pro membership). To view your audit logs, login to your Encyro account and
- Go to Settings.
- Click “Compliance” in the left panel (on a mobile device, scroll down to “Compliance Settings”).
- Find the heading Audit Trails and click the “My Activity Logs” button.
Related articles
-
Configuring Compliance Settings
(If your Encyro account is part of an organization, see organizational compliance settings.) To enable or edit compliance settings, go to your account Sett...
-
Can I enable compliance if I login using my Google/Facebook account?
You will be required to create an Encyro account password to enable the following compliance settings: Require strong password for account login. Automatic...
-
What country does Encyro operate from?
Encyro Inc is based in the United States of America, and is subject to US laws and regulations. Your data in your Encyro account is stored in our data cen...
-
Encyro's AICPA SOC2 Compliance
Encyro maintains and monitors compliance with trust service criteria established by the AICPA as part of the SOC2 standard for service organizations. Encyr...
-
Access Audit Logs for Other Users
A user with data manager permissions (Can set compliance... permission) can access activity logs for any user within the organization. This may be used for...
-
Access another user's data within your organization
A user with data manager permissions (Can set compliance... permission) can access the data (secure messages and files), for any user within the organizati...
-
What are the benefits of a Team/Organizational account?
How is a team account different from separate Pro accounts for the same people? When you add add additional users or employees (team-mates, practice partne...
-
NIST 800-171 Compliance
National Institue of Standards and technology (NIST) Special Publication 800-171 or NIST-SP800-171, specifies requirements for non-Federal computer systems...
-
Do I need a Pro account for each employee?
You only need Encyro Pro accounts for employees who need to use Encyro to communicate securely using Encyro. If you only needed Encyro Pro to receive secur...
-
Gramm Leach Bliley (GLB) Act Compliance
The GLB Act of 1999 and the Safeguards Rule of 2002 require all financial service providers to protect their customer's financial privacy and is enforced b...