Table of Contents

Report Example
Introduction
The Login Log Report provides supervisors with an overview of users who have accessed or attempted to access the system. This report helps in monitoring login activity, tracking unauthorised access attempts, and ensuring system security.
Access Requirements
The Login Log Report is only available to supervisors with 'System Access' authorisation. Ensure you have the necessary permissions before generating or reviewing the report.
Purpose of the Report
This report enables supervisors to:
- Monitor user login activities.
- Identify failed login attempts that may indicate security risks.
- Track system access trends over a specified period.
- Ensure compliance with access control policies.
Key Components of the Report
1. Report Header
- Report Name: Assigned during report definition.
- Report Type & Period: Specifies the type of report and the time period covered.
2. Login Activity Breakdown
Provides login details per date:
- Time: Timestamp of each access attempt.
- Detail: Specific details of the login event.
- By: The username of the individual attempting to access the system.
- Result: Outcome of the access attempt (e.g., success, failed login attempt, locked account).
3. Report Footer
- Displays the date and time when the report was generated.
Use Case Example
Scenario: Detecting Unauthorised Login Attempts
Background: A supervisor wants to ensure that only authorised users are accessing the system.
Using the Login Log Report:
- The supervisor generates the report for the past week.
- The report reveals multiple failed login attempts from an unknown user.
- The supervisor takes action:
- Notifies the IT security team for further investigation.
- Reviews user access rights to confirm no unauthorised accounts exist.
- Instructs users to update their passwords if suspicious activity is detected.
By using the Login Log Report, the supervisor enhances system security and ensures only authorised personnel access the system.
Conclusion
The Login Log Report is an essential tool for supervisors to track system access, detect unauthorised login attempts, and maintain security compliance. Regular monitoring of this report helps protect the integrity of the system.