Activity Log – Overview
The Activity Log page provides a comprehensive audit trail of all user and system activities performed across the organization. It helps administrators track configuration changes, user actions, and system events for security, compliance, and troubleshooting purposes.
This page captures who performed an action, what action was taken, when it occurred, and what changes were made.
Navigation
Path:
Select Network → Monitor → Organization → Activity Log
Page Layout
The Activity Log page is divided into the following sections:
Filter & Search Controls
Activity Log Table
1. Filter & Search Controls
Located at the top of the page, these controls allow users to refine activity log results.
Time Range Selector
Allows users to select the time window for viewing activities.
Default selection: Last 7 days
Custom date range can be selected using the calendar picker.
User Filter
Allows filtering activities performed by a specific user.
Network Filter
Enables filtering activities by a specific network.
Activity Filter
Allows selection of one or more activity categories.
Displays the count of selected activities.
Activity Type Selector
Allows further refinement based on activity type (e.g., create, update, delete, login).
Search Button
Applies all selected filters and displays matching activity records.
Export / Download
Allows downloading activity logs for audit or compliance review.
2. Activity Log Table
This section displays all activity records in a structured table format.
Table Columns
Performed By
Displays the user or system account that performed the action.Performed At
Shows the date and time when the activity occurred (UTC).Type
Indicates the type of action performed (e.g., login, create, update).Activity On
Specifies the entity on which the action was performed (e.g., User, Device, Uplink).Network
Displays the network associated with the activity.New
Shows the updated or newly applied values after the action.Old
Displays the previous values before the change was made.
Key Use Cases
Audit & Compliance
Track configuration changes and user actions across the organization.Security Monitoring
Review login activities and detect unauthorized or unusual behavior.Troubleshooting
Identify recent changes that may have caused network or device issues.
