Summary: Maintaining oversight into who accessed (or attempted to access) your marketing content is a critical component of demonstrating strong internal compliance standards.
We've introduced a robust authentication activity log that tracks all browser-based authentication, including logins and password modifications. Each action shows the person's name, email, IP address, operating system, browser, method and date and time.
This level of detail and oversight not only keeps data safe, but provides continuous proof of due diligence and control over brand and data compliance.
Available for: Admins on the Enterprise edition.
Where is the feature setup? The "Authentication Activity" log is located from within the Manage Account dashboard.
How does it work?
Once you open the authentication log you will see a list of data collected in your account. There are several types of data that the system can store such as login attempt, password reset, personal information change, invalid password login attempt and password reset request.
You can also use a time period selector if you want to find a specific event or narrow down the search results. The authentication log shows data for all users or you can select a specific user.
Each event displayed in the log has some additional information:
- IP address from which the action was taken
- OS and browser of a user
- Authentication method
- Exact time and date of the event