Businesses must review their logs daily to search for errors, anomalies, or suspicious activity that deviates from the norm. The biggest problem with logs is: nobody looks at them.
From a security point of view, the purpose of a log is to act as a red flag when something bad is happening. Reviewing logs regularly could help identify malicious attacks on your system.
Under this tab the tenant’s activity such as
Turn on/off AutoPay
Upload tenant document
Update the password
Note: All the above activities are performed from the online portal & not on the admin panel.
For all the above activity the tenant IP, Location, browser version along with the time of the activity will be monitored.
Whenever a tenant tries to access from a new IP then an email will be sent to the tenant to confirm the log activity.
The IP address from which the tenant does the move-in is the first IP that will be saved in the tenant details.