- Knowledge Base
- Users
- Login History
- Login history
- How to add a run
- How to edit a run
- How to mark a run as complete
- How to archive a run
- How to delete a run
- How to change the assignee
- How to add a result in a checklist run
- How to add bulk results in a checklist run
- How to share run tasks with external participants
- How to generate an Excel or PDF report from a checklist run
- How to filter the run tasks view
- Department transactions
- How to edit a transaction
- How to cancel a transaction
- How to deactivate a transaction
- How to create a budget
- How to approve budgeting items from the transactions grid
- How to record an estimate
- How to create a purchase order from approved estimates
- How to link approved estimates to approved budgets
- How to submit transaction items for approval
- How to re-submit a denied transaction
- How to upload from Excel to the transactions grid
- What is an office asset
- How to create a new asset
- How to manage an asset
- How to move an asset
- How to dispose of an asset
- How to transfer (in) an asset
- How to transfer (out) an asset
- How to log a sighting of an asset
- How to log an inspection of an asset
- How to log maintenance on an asset
- How to export a record of an asset
- How to print asset labels
- Introduction
- Admissions
- Assets
- Bank Accounts
- Boards
- Business Trips
- Candidates
- Checklists
- Clients
- Companies
- Consents
- Contacts
- Contracts
- Custom Forms
- Departments
- Documents
- Evaluations
- Employee Performance
- GL Accounts
- Incoming Center
- Integrations/External Systems
- Invoices
- Job Management
- Key Dates
- Months
- Offices
- Personnel
- Polls
- Project Management
- Project Status
- Purchase Orders
- Schedule
- Shared Spaces
- Teams
- Time Off
- Time Tracking
- Transactions
- Vendors
- Mobile Application
- What is a personnel asset
- How to create a new asset
- How to manage an asset
- How to move an asset
- How to log inspection on an asset
- How to log maintenance on an asset
- How to dispose of an asset
- How to transfer (out) an asset
- How to transfer (in) an asset
- How to log a sighting on an asset
- How to print asset labels
- How to export a record of an asset
- What is a project asset
- How to create a new asset
- How to manage an asset
- How to move an asset
- How to log inspection on an asset
- How to log maintenance on an asset
- How to dispose of an asset
- How to transfer (out) an asset
- How to transfer (in) an asset
- How to log a sighting of an asset
- How to print asset labels
- How to export a record of an asset
- Project transactions
- How to edit a transaction
- How to cancel a transaction
- How to deactivate a transaction
- How to create a budget
- How to approve or deny budgeting items from the transactions grid
- How to record an estimate
- How to create a purchase order from approved estimates
- How to link approved estimates to approved budgets
- How to submit transaction items for approval
- How to re-submit a denied transaction
Login history
What is User Login History
The User Login History in Vault Synapse provides a complete record of all login activity for each user. This feature enhances visibility into account access, helping administrators monitor activity, track login behavior, and strengthen security.
From the Users module, select a user and open the Login History tab. Here, you will find a detailed log of every login attempt, including the date and time, IP address, device, operating system, location, and method of authentication. For added security insights, login locations can also be viewed on an interactive map, making it easier to detect unusual access patterns or suspicious activity.
Login History Columns
- Logged On – Shows the exact date and time when the login attempt occurred.
- IP Address – Displays the IP address used during login, allowing traceability of the network.
- Device – Identifies the browser or client used, such as Chrome, Firefox, or other supported platforms.
- Operating System – Indicates the operating system of the device used for login, for example Microsoft Windows, macOS, Linux, or mobile platforms.
- Location – Provides the geographic location of the login attempt, based on the IP address.
- Login Method – Specifies the authentication method used, such as password login, SSO (Single Sign-On), or multi-factor authentication.
Was this article helpful?
Didn’t find what you were looking for?
Contact us and we’ll build the right solution for you. Vault Synapse can be fully customized based on your business needs.