Investigating user-related activity on your Security Center system - Security Center 5.12

Security Center Administrator Guide 5.12

Product
Security Center
Content type
Guides > Administrator guides
Version
5.12
Language
English
Last updated
2024-09-13

Using the Activity trails report, you can view several categories of user activity: access control, ALPR, general, and video.

Before you begin

To receive results in the Activity trails report, you must already be monitoring user activity. You can select which activities to monitor and record in the database from the System task.

What you should know

You can use the Activity trails task to investigate various user activities such as:
  • Who played back which video recordings.
  • Who blocked a camera.
  • Who activated a threat level.
  • Who requested a credential badge to be printed.
  • Who used the Hotlist and permit editor task.
  • Who enabled hotlist filtering.

Procedure

  1. From the Config Tool or Security Desk homepage, open the Activity trails task.
  2. In the Activities filter, select the user activity you want to investigate.
  3. Set up the other query filters for the report. Choose from one or more of the following filters:
    Application
    Which application type was used for the activity.
    Event timestamp
    Define the time range for the query. You can define the time range for a specific period or a relative period, such as the previous week or the previous month.
    Impacted
    The entities that were impacted by this activity. Choose one of the following filters:
    Specific entities
    Search entities by name and select one or more.
    Entity types
    Select one or more entity types.
    Initiator
    User or role responsible for the activity. Choose one of the following filters:
    Specific entities
    Search entities by name and select one or more.
    Entity types
    Select one or more entity types.
  4. Click Generate report.
    The activity results are listed in the report pane.