Audit Logs

Track all security and operational events in your Qserve account.

What is Logged?

Qserve maintains a comprehensive audit trail of all security-relevant and operational events. Every action is stamped with a timestamp, the acting user, their IP address, and relevant metadata.

CategoryEvents Tracked
AuthLogin, logout, failed login, password change, account lockout, unlock
SubscriberAccount created, edited, suspended, reconnected, deleted, package changed
PaymentM-Pesa STK push, payment callback received, manual payment recorded
NetworkRouter connected/disconnected, CoA sent, subscriber disconnected by expiry
AdminTeam member added/removed, role changed, settings modified
SystemConfiguration changes, SMS/WhatsApp/email provider updates

Viewing Audit Logs

  1. Go to Admin → Audit Logs (only accessible to Owner and Manager roles).
  2. Logs are shown in reverse chronological order — newest first.
  3. Use the search box to find events by action type, email, or IP address.
  4. Filter by category (Auth, Payment, Network, etc.) using the dropdown.
  5. Filter by severity: Info, Warning, or Critical.

Severity Levels

LevelMeaning
InfoNormal operation — login succeeded, subscriber activated, payment received
WarningEvents requiring attention — failed login attempt, rate limit hit, account locked
CriticalSecurity incidents — multiple failed logins, suspicious access patterns

Log Retention

Audit logs are retained for 90 days. After 90 days, logs older than this threshold are automatically deleted. If you need longer retention for compliance purposes, export logs regularly using the Export CSV function.

Security Monitoring

Check audit logs regularly for these warning signs:

  • Multiple failed logins from the same IP — possible brute force attempt
  • Logins from unusual locations or IP addresses
  • Unexpected subscriber account changes
  • Large numbers of CoA disconnects in a short period
  • Payment callbacks from unknown sources

If you suspect a security incident, immediately change all team member passwords and review recent audit log entries for unauthorised actions.