Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

+1 -800-456-478-23

// TAKE CONTROL WITH OUR ROUTER MANAGEMENT SOFTWARE

MikroWizard combines the power of syslog and radius server for better and more accurate session monitoring.

The “audits & logs” section in a Mikrowizard router management system includes several capabilities to help you track and monitor activities in the system effectively.

By utilizing the “audits & logs” section with these abilities, you can maintain a comprehensive record of activities, monitor user interactions, and ensure the security and integrity of your network environment. Tracking and analyzing logs can help you detect anomalies, prevent security breaches, and maintain regulatory compliance.

// Authentication Logs

Enhanced Device Access Control with MikroWizard Radius Server

Authentication logs in MikroWizard routers provide valuable insights into network activity, allowing administrators to track user access, identify potential security threats, and enforce access control policies effectively.

MikroWizard keep track of all user logins and logouts, including information about who connected, how they connected, and when they connected, connection duration. The log also captures information about how the user connected, such as whether they used a local account, a remote authentication server like RADIUS, or a specific protocol like SSH or FTP.

Identifying Connected Users: Success or Failure?

MikroWizard will typically record both successful and failed login attempts. When a user successfully connects to the router, their username and IP address will be logged in the authentication log as a successful login event. This allows administrators to track which users are accessing the network and when they are doing so.

Log User Login and Logout Events

MikroWizard indeed log events such as when users log in and log out. When a user logs in to the router, their username, IP address, and the date and time of the login event are typically recorded in the authentication log. This information allows administrators to track user access to the network in real-time. By logging both login and logout events, authentication logs in Mikrotik routers provide administrators with valuable information about user activity on the network. This data can be used to analyze user behavior, troubleshoot issues, and identify any potential security threats.

Log Various Connection Types in Mikrotik Routers

MikroWizard can also log different connection types, such as connections made through web, Winbox, API, SSH, Telnet, and more. When a user connects to the router using one of these methods, the authentication log will typically record information about the connection type, including the protocol used and the access method. Monitoring connection types in Mikrotik routers is important for network administrators to track how users are accessing the network and to identify any potential security vulnerabilities. By reviewing the authentication logs, administrators can quickly identify which protocols are being used to access the router and take appropriate measures to secure the network against unauthorized access.

Log Source Addresses of Users Connecting to the Network: IP or MAC

When a user connects to the router, their source address, either in the form of an IP address or a MAC address, will typically be recorded in the authentication log. By logging the source address of users, administrators can easily identify where the connection is coming from and track user activity on the network. This information is valuable for monitoring network usage, troubleshooting connectivity issues, and identifying potential security threats.

Filtering and Searching Capabilities for Authentication Logs
Administrators can use filters to narrow down the log entries based on criteria such as user names, IP addresses, connection types, timestamps, and more. This allows for easier visibility and analysis of specific login/logout events or connection types.
// ACCOUNTING LOGS

Monitoring Connected User's Activity

The accounting logs in MikroWizard play a crucial role in tracking the activities of connected users.
They provide detailed information about each user’s actions while connected to the router, including username, device name, device IP, and more.
This valuable data is essential for monitoring user behavior, enforcing usage policies, and identifying any abnormal or suspicious activity.
User Action Logging: Monitoring and Tracking User Activities

In MikroWizard, accounting logs track and record various activities related to user connections. This includes changes, additions, and deletions made by users to the Mikrotik router, providing valuable insight into network usage and management.

Sections in Logs: Tracking Changes Made by Users

MikroWizard record of all activities related to accounting functions. This includes tracking changes made by users in various sections of the router’s configuration, such as NAT rules, Filter rules, and DHCP client...

Executed Configurations

In the MikroWizard accounting logs, you can efficiently view all executed configurations and comments in just one click. This invaluable feature allows for easy tracking of changes made to the router's settings by each user or session and enables quick identification of any modifications.

Enhanced Filtering and Search Options for Accounting Logs
Enhanced filtering and search options for event logs in Mikrotik routers allow administrators can easily monitor and track user activities. By utilizing these capabilities, users can efficiently filter through a large volume of event logs to pinpoint specific actions taken by users.
// Device Events

Logging Mikrotik Routers Events

The “event logs” in MikroWizard are a goldmine of information about the operation of router devices. It capture various event types, including configuration changes, system errors, login attempts, DHCP events, wireless events, and more. Each log entry includes crucial details such as the event time, source, type, and relevant information about the event occurrence. By regularly monitoring and reviewing these event logs, administrators can reinforce network security, troubleshoot issues, and effectively track user activities.
Log router device events Based on the level of importance

Event logs in MikroWizard can be categorized based on their level of importance to network security and performance monitoring. Critical events such as system errors, unauthorized access attempts, and configuration changes are logged to prioritize immediate attention from network administrators. By analyzing and prioritizing event logs based on their level of importance, administrators can effectively address security threats, maintain network performance, and ensure the smooth operation of Mikrotik routers.

Log router device events Based on the event types

MikroWizard categorize events based on their type . Including health, State events, Errors and more. By monitoring and analyzing Mikrotik routers, administrators can proactively address issues, prevent network downtime, and maintain a secure and efficient network infrastructure.

Log router device events Based on the event details

The event logs in MikroWizard contain detailed information about specific events that occur within the network. These event details include specific information about the event, which enables better categorization and filtering. Analyzing event logs based on these event details allows administrators to effectively troubleshoot problems, detect unauthorized access attempts, and ensure the proper functioning of MikroTik routers

Tracking Status of events: fixed or not fixed

In MikroWizard users can track the status of issues as either fixed or not fixed. When an event is logged, network administrators can indicate whether the issue has been resolved (fixed) or still requires attention (not fixed). By monitoring the status of event logs, administrators can track the progress of troubleshooting efforts, ensure that critical issues are addressed promptly, and maintain the overall security and performance of the network. Analyzing the fixed or not fixed status of event logs helps administrators prioritize their tasks and focus on resolving any outstanding issues efficiently.

Improved Filtering and Searching Features for Router Device Event Logs
This feature allow administrators to efficiently sort through and locate specific events based on various criteria. By utilizing these improved features, administrators can quickly narrow down the list of logs to find relevant information, investigate issues, and take necessary actions to maintain network security and performance. These advanced filtering and searching options streamline the process of analyzing event logs and enable administrators to effectively manage and troubleshoot network events.
// system logs

Insightful Monitoring with System Logs

System logs in MikroWizard are records of activities that occur on the MikroWizard itself. These logs provide valuable information for troubleshooting and monitoring user activity in MikroWizard. The system logs include information such as the date and time of the action, source IP addresses, the username, the section of the platform, and the action that occurred.
Log System Actions

The action field in MikroWizard System Logs describes the specific action of each user in panel. This could include actions like a user logging in…, and show like: successful, update, edit and create.

Filtering and Search Options for System Logs
Filtering and search options for system logs in MikroWizard allow administrators to easily locate specific log entries, troubleshoot issues, and monitor network activity more effectively. The system logs provide information about various events, warnings, and errors that occur on the router, helping administrators identify potential problems and ensure network security.