Events - CAN
The Events tab gives you a detailed chronological log of user actions across all onboarded vessels and networks. It provides critical insights into login activities, logout patterns, and failed attempts that can be used for troubleshooting, auditing, or security assessments.
-20250720-213457.png?inst-v=e784320c-6c50-4349-b618-44db48ebcb69)
Events
The Table shows the following information:
Event Time - Date and time when the event occurred (shown in your local time zone)
Organization - Name of the parent organization associated with the ship or site
Site - Name of the ship or platform where the event originated
OS - Operating system used by the device initiating the event
Event Type - Type of event logged (e.g., Login, Logout, Failed Login)
Description - A short description of the event for quick understanding
Username - The user ID or email associated with the event
IP Address - The source IP address of the device triggering the event
MAC Address - The device’s MAC address for identification and tracking
Action - Shows whether the user logged in or logged out
How to Use
Audit Logins/Logouts: Monitor user access behavior across all vessels and platforms.
Identify Security Threats: Spot suspicious activities like repeated failed logins.
Compliance Check: Validate if authorized users are accessing the system as expected.
Troubleshoot Connectivity: Use IP and MAC addresses to trace technical issues.
Filtering & Exporting
Use filters at the top to search by date range, event type, username, or organization.
Export logs to CSV for compliance, incident response, or offline analysis.
Tips
Watch out for login attempts from unknown IPs or unexpected devices.
Track frequent logouts followed by logins—they may indicate connectivity issues.
Filter by OS if you’re troubleshooting platform-specific issues (Android, iOS, etc).