<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=222868361777687&amp;ev=PageView&amp;noscript=1">
Skip to content
English
  • There are no suggestions because the search field is empty.

How to use the User log

Use the log to support troubleshooting, audit trails, and compliance with a searchable history of user activity.

The User log provides a searchable history of user activity in Qvalia. It is designed for administrators and security officers who need traceability for logins and user management events.

Typical use cases

  • Verify when a user logged in successfully

  • Confirm who added or removed a user

  • Track role changes over time

  • Review activity from a specific IP address

  • Produce audit evidence for internal or external reviews

Accessing the User log

  1. Go to Organization logs in the upper right top menu. 

  2. Select User log.

Time range

At the top of the page you define the time window for the list:

  • Start date

  • Start time

  • End date

  • End time

Only activity within this period is shown. This is the primary way to limit the results before you apply filters.

Controls

In the top-right corner, next to the period settings, you have:

  • Export – exports the current result list to CSV.

  • Filters – opens the filter panel for user actions.

  • Apply – refreshes the list using the current time range and filter settings.

Table columns

The User log table shows one row per event.

  • Time – timestamp for when the event occurred.

  • Action – the type of user event, for example:

    • Login succeeded

    • User added

    • User removed

    • Role change

  • Description – additional information when relevant (for example details about a change).

  • Action by – the user account that performed the action, or the account that logged in.

  • IP address – the IP address from which the action originated.

Exporting the User log

  1. Set the time range and any filters you need.

  2. Click Export.

  3. Open the CSV file in your preferred tool for further analysis, archiving or sharing with auditors.

Use cases

Examples of what you can do:

  • Check recent logins for a specific user using the Action by column.

  • Confirm that a user was added or removed at a certain time.

  • Review all activity from a specific IP address.

  • Export the list to include in audit or access control documentation.