- Home
- /
- Article
Log and analyze user sign-ins and sign-outs
As a full administrator, you can keep track of user sign-ins and sign-outs. You can analyze this data to help make accounts more secure.
Once you toggle Allow user authentication data on in Control Hub, user sign-ins and sign-outs are logged and can be retrieved through the public API. You can then view and analyze the data in security applications such as UEBA and SIEM, which can run their machine learning algorithms to discover suspicious and malicious behaviors, detect attack vectors, and identify compromised passwords.
Webex stores the data for 12 months.
View user activities through Webex API
1 |
Sign in to Control Hub, then under Management, select Organization Settings. |
2 |
In the User authentication data section, toggle Allow user authentication data on. |
3 |
Go to List Security Audit Events to retrieve the data. |
View user activities in Control Hub
You can also view and troubleshoot sign-in issues for your users by reviewing their sign-in and sign-out activities in Control Hub.
1 |
Sign in to Control Hub and go to . |
2 |
Click the Authentication activities tab. User activities are displayed under the following columns:
|
3 |
Filter by user activity, specific dates, email address, IP address, or service, to narrow your search results. |