Businesses must review their logs daily to search for errors, anomalies, or suspicious activity that deviates from the norm. The biggest problem with logs is: nobody looks at them. 

From a security point of view, the purpose of a log is to act as a red flag when something bad is happening. Reviewing logs regularly could help identify malicious attacks on your system.



Under this tab the tenant’s activity such as 

  1. Move-in 

  2. Scheduled Move out

  3. Cancel Schedule Move out

  4. Edit Tenant Info( Tenant Details, Photo upload, etc)

  5. Add Card

  6. Delete Saved Card

  7. Turn on/off AutoPay

  8. Upload tenant document

  9.  Download statement

  10. Making Payment

  11. Update the password

  12. Login/  Logout




 


Note: All the above activities are performed from the online portal & not on the admin panel. 



For all the above activity the tenant IP, Location, browser version along with the time of the activity will be monitored. 


Whenever a tenant tries to access from a new IP then an email will be sent to the tenant to confirm the log activity.


The IP address from which the tenant does the move-in is the first IP that will be saved in the tenant details. 




Edit Tenant Info