Web User
-
You can monitor user and administrative activities in detail.
-
Track key actions like logins, device enrollments, and user account management.
-
Maintain a clear timeline of events to improve security and compliance oversight.
System
-
Clicking on system logs will give you access to an extensive system overview of devices.
-
Monitor various metrics such as:
-
CPU consumption
-
Top processes
-
CPU load averages
-
Most utilized APIs
-
-
Verify the operational status of key services.
-
View detailed insights into:
-
Memory usage
-
Disk usage
-
Disk read/write rates
-
-
Gain a comprehensive snapshot of system health and performance.
Mobility User
-
You can access and review mobility user logs.
-
Document various user activities, including:
-
Sign-ins and sign-outs
-
Password resets
-
Monitor user behavior to ensure security protocols.
VPN Traffic
-
You can view device-to-IP mapping logs with timestamps, including:
-
Device model
-
Name
-
UUID
-
Monitor VPN traffic logs for insights into user activities over the network.
Device Enrollment
-
You can track enrolled devices under BYOD or Fully Managed Connect.
-
Provides a clear record of device onboarding for management.
-
Differentiates device types for better policy application.
Sensor Access
-
Monitor applications accessing device sensors like the camera or microphone.
-
Ensures transparency and security for sensitive features
New Apps Detected
-
Identifies newly downloaded apps on specific devices.
-
Help IT teams track and control application installations.
-
Enables early detection of unauthorized or unapproved apps.
Device Application
-
Tracks all applications installed on each device.
-
Provides visibility into the app ecosystem for individual devices.
-
Helps identify unauthorized or non-compliant applications.
Application Update
-
Monitors which applications have received new updates.
-
Ensures compatibility and security across devices with the latest versions.