• Active Directory
  • Application
  • Desktop & Mobile
  • Help Desk
  • Network
  • Server
  • IT Security
  • MSP
  • Cloud
  • Unified IT
Device Management, made easy
Manage control and secure your workstations, mobile
devices and tablets
Help Desk for Everyone
IT Help Desk Software and Customer Support Software
Manage services faster, with multi-tenanted, ITIL-ready, and unified RMM solutions
Cloud Solutions
IT Help Desk, and Operations Management from the Cloud
Manage IT as one
Unleash the power of Unified Monitoring

User Activity Tracking

Audit, Reports & Miscellaneous

User Activity Tracking - 'who', 'what' and 'when' of configuration changes

Users perform various operations on device configuration such as backing up the configuration, uploading configuration to device, enabling real-time change detection etc., When something goes wrong due to faulty configuration change or when a security breach occurs, it is important to trace user actions to ensure accountability in the organization. To ensure this, it is essential to record the information on who invoked what operation, on what device, at what time and the result of the operation. This is done by the Audit module of Network Configuration Manager and this is termed as "Device Operation Audit".

Besides, information about the various scheduled tasks executed by Network Configuration Manager along with details such as schedule name, result of execution etc., are listed by the Audit Module under "Schedule Audit".