By Appointment to
His Majesty The King
Contact Centre Service Software
Cirrus Response Ltd
Epsom

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Cirrus eLearning
  • Contact Us
Lost-Image
  • Home
  • CIRRUS HALO
  • Supervisor
  • Reports

Login Log

Written by Keith Winhall

Updated at December 5th, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • CIRRUS HALO
    Agent Supervisor Administrator Troubleshooting
  • CIRRUS DIGITAL
    Agents Supervisors Administrators
  • RELEASE NOTES
    Release FAQs CIRRUS HALO CIRRUS DIGITAL
  • CUSTOMER BILLING
+ More

Table of Contents

Report Example Introduction Access Requirements Purpose of the Report Key Components of the Report 1. Report Header 2. Login Activity Breakdown 3. Report Footer Use Case Example Scenario: Detecting Unauthorised Login Attempts Conclusion

Report Example

 
 

Introduction

The Login Log Report provides supervisors with an overview of users who have accessed or attempted to access the system. This report helps in monitoring login activity, tracking unauthorised access attempts, and ensuring system security.

Access Requirements

The Login Log Report is only available to supervisors with 'System Access' authorisation. Ensure you have the necessary permissions before generating or reviewing the report.

Purpose of the Report

This report enables supervisors to:

  • Monitor user login activities.
  • Identify failed login attempts that may indicate security risks.
  • Track system access trends over a specified period.
  • Ensure compliance with access control policies.

Key Components of the Report

1. Report Header

  • Report Name: Assigned during report definition.
  • Report Type & Period: Specifies the type of report and the time period covered.

2. Login Activity Breakdown

Provides login details per date:

  • Time: Timestamp of each access attempt.
  • Detail: Specific details of the login event.
  • By: The username of the individual attempting to access the system.
  • Result: Outcome of the access attempt (e.g., success, failed login attempt, locked account).

3. Report Footer

  • Displays the date and time when the report was generated.

Use Case Example

Scenario: Detecting Unauthorised Login Attempts

Background: A supervisor wants to ensure that only authorised users are accessing the system.

Using the Login Log Report:

  1. The supervisor generates the report for the past week.
  2. The report reveals multiple failed login attempts from an unknown user.
  3. The supervisor takes action:
    • Notifies the IT security team for further investigation.
    • Reviews user access rights to confirm no unauthorised accounts exist.
    • Instructs users to update their passwords if suspicious activity is detected.

By using the Login Log Report, the supervisor enhances system security and ensures only authorised personnel access the system.

Conclusion

The Login Log Report is an essential tool for supervisors to track system access, detect unauthorised login attempts, and maintain security compliance. Regular monitoring of this report helps protect the integrity of the system.

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Logging In & Out
  • Supervisor Desktop Layout
  • Outbound Monitoring

Cirrus
The Coach House
17 West Street
Epsom, Surrey
KT18 7RL
Tel: 0333 103 3333
Email:
sales@cirrusconnects.com

Social: twitter linkedin

Privacy Policy

Postal address
Cirrus
The Coach House
17 West Street
Epsom, Surrey
KT18 7RL
Tel: 0333 103 3333
Email:
support@cirrusconnects.com

© Copyright Cirrus


Expand

Need help? Ask the Cirrus Helpbot