- Enter the Title.
-
Select the Result (Failed, Successful, or Timeout), choose the Type (User Sign-In Policy or Administrator Sign-In Policy), and specify the Severity (Any, High, Medium, or Low).
-
Set the Time range.
-
Click Search.
-
Your filtered alerts will appear below, reflecting your selected criteria.
Logs and Reports
-
View Traffic Logs
See moreThis article provides instructions on how to view traffic logs, an important step in troubleshooting agent and network-related issues.- View all the traffic in your network with details on Timus Manager -> Insights -> Traffic Logs page,
- Search the list using Time, Source, Action, Destination, Factor parameters on the Logs tab.
- Clear the filters you have created by clicking on Clear All Filters.
- You can gather more information by clicking the icon in the Details section to identify if there's been an issue.
- You are able to check the Rule IDs of the traffic logs to detect which rule allows or denies the traffic.
- If you have previously enabled SSL Inspection for a user or device, you can access detailed data by going to the User or Device tabs.
In the Traffic Logs page, where you can access comprehensive data presented through tables and graphics organized into various tabs. Here's an overview of what you'll find in each tab:
You can download the csv file to get a report for your traffic by clicking on Export at the top right of the screen as shown in the image above.
Only the last 10.000 records will be exported when you have created it.
When you have clicked on the Export button, you will see the pop-up above when the Export process is completed successfully. You can click on Download to get your report.
- User Tab: User Information Top Most Active Users Detailed User Logs Most Active Devices per User Traffic Analysis Most Frequently Accessed Resources Time Spent by Users
- Team Tab: Top Most Active Teams Team-specific Activity Data Most Active Devices within Teams Most Used Resources by Teams Time Spent by Teams
- Device Tab: Device Information Most Active Devices Device-specific Activity Data Most Used Resources by Devices Time Spent on Devices
- Applications Tab: Most Used Applications Application-specific Usage Data
- Website Tab: Most Accessed Resources on Websites
- Network Tab: Most Active Networks
This organized approach allows you to analyze user behavior, team activities, device usage, application preferences, website interactions, and network engagement.
Dive into detailed insights to make informed decisions about your product usage and optimize your resources effectively.
-
View User Traffic
See moreThis article explains how to view user traffic and their details on your network.To view detailed user traffic for each user, follow the steps below:- Go to Timus Manager -> Insights -> Traffic Logs page.
- You can view all traffic on the Logs tab without navigating to other tabs.
- To configure the list, utilize the search bar. To view a specific user's traffic, navigate to the Source heading.
- Click on "Select" here.
- Click on "User".
- Click on "Start typing..." Select a user or scroll down the dropdown menu to find a user and view their traffic logs.
Click on the "Search" button.
By clicking the Search button, you can access a list displaying all the traffic generated by this user on your network.
To access the details of the traffic logs listed, click on the blue info icon located at the far right of the respective line.
You can use the Search bar to display more specific information about the logs you want to see.
Simply insert the desired columns with the appropriate command:
Time: Select the Start and End date of the traffic logs you want to display on the list.
Action: Choose between Drop or Allow.
Destination: Specify Team, Device, IP, Network, Site, or Any.
Factor: Specify Application, Category, Website, Keywords, or Any.
- Similarly, to see a user's traffic logs and in general, to view all user's traffic logs Click the User tab on this page.
- To view detailed user traffic, select a user from the Select section at the top of the page.
After selecting the user, you display the following information on the page.
- Most Active Users,
- Users Logs,
- The user's Most Active Devices,
- Traffic,
- Applications and Websites as the user's Most Used Resources,
- Time Spent as applications and websites where the user spends the most time,
- The user's Events on your network.
You can also view traffic details for the following components by going to the Insights dropdown > Traffic Logs page:
- Logs
- User
- Team
- Device
- Application
- Website
- Network
-
View Alerts
See moreOverviewThis article explains how to view alerts generated by Zero Trust Security Policies in Timus Manager.- Please navigate to Timus Manager > Insights > Alerts to view alerts for your selected, activated policy type.
- At the bottom of the page, you’ll find the total number of alert records.
- Use the paging control next to the total records count in the lower-right corner to move between alert list pages
Please navigate to the Alerts & Notifications tab on the Zero Trust Sign-In Policies page (User or Admin) to enable these notifications.
- Please use the Search filter at the top of the Alerts page to refine your alert results.
-
- Click Export at the top right of the screen, then in the pop-up that appears, click Download to save the alerts as a CSV file.
-
-
Click the ellipsis icon at the end of the alert row to view its details.
-
-
-
To mark an alert as Read or Unread, click the appropriate option—read alerts will display with faded text.
-
To Delete an alert, select the delete action.
-
-
View Events
See moreOverview
By filtering sign-in events in your network, you can quickly pinpoint activity based on criteria such as risk level, location, and authentication status. Navigate to Timus Manager > Insights > Events, then choose the User or Administrator tab to view:
-
User: connections via the Timus Connect Application
-
Administrator: connections to the Timus Manager portal
The results table displays Event, Authentication, Risk Level, Location, and Time. In the Authentication column, each step is color-coded: green for success and red for failure.
Steps
-
Navigate to the Events page
Go to Timus Manager > Insights > Events and select either the User or Administrator tab. -
Enter Public IP
In the Public IP field, type the IP address you wish to investigate. -
Select Date/Time
Click the Date/Time filter and choose your desired range. -
(Optional) Set Risk Level
From the Risk Level dropdown, select High, Medium, or Low, or leave blank to include all. -
Initiate Search
Click the Search button to apply your filters. -
Review Results
Examine the table, which shows:-
Event name
-
Authentication steps and outcomes (green = success, red = failure)
- Result
-
Risk Level
-
Location
-
Time
-
-
On both the User and Administrator tabs, click Export (top right), then select Download in the pop-up to save your report as a CSV file.
View Event Details
You can see the details of the each by clicking on the ellipsis icon at the end of the row:
- Click the ellipsis icon in the row containing user or administrator information, and select Details.
- Scroll down to view the IP Intelligence section in the Event Details window.
- On this section, you can see IP Intelligence information related to the IP address of the device used for sign-in:
The IP Intelligence section is only visible when a sign-in policy with the Untrusted IP Behavior has been defined for the specific IP.
- Proxy: Shows if a proxy server is detected.
- VPN: Shows if a VPN server is detected.
- TOR: Shows if a TOR network node is detected.
- Fraud Score: Shows the fraud score (1-100).
- Abuse Velocity: Shows abuse velocity (high/medium/low).
- Recent Abuse: Shows if recent abuse detected.
- Bot Activity: Shows if bot activity detected.
-
-
Automated Reports
See moreOverview
This article explains how administrators can leverage the Automated Reports feature in Timus Manager to gain on-demand or scheduled AI-generated insights across their network. By managing templates and configuring report parameters, you can deliver tailored analytics—daily, weekly, monthly, or yearly—to stakeholders via email.
1. Access the Automated Reports Page
-
In Timus Manager, go to Insights > Automated Reports.
2. Manage Templates
-
Click View Templates (upper right).
-
Review available templates under Predefined and Custom.
-
To view or run the Predefined Weekly Template, click its ellipsis icon and choose View or Use as New by hitting Create New.
3. Create a Custom Template
-
In View Templates, click Create Template.
-
Enter a Title and click Create.
-
On the new template page, click Add Widget to select analytics components.
-
You can hit Add any Widgets depending on your needs.
- After adding required Widgets, hit Confirm
4. Generate a Report
-
Return to Automated Reports and click Create New(upper-right)
-
Enter a Title, choose the Type and Template, and add Recipients with their preferred email language.
-
Click Save—a success notification will appear.
5. Run and Schedule Reports
-
On-Demand: From the Reports list, click the ellipsis on your report and select View.
- On the View page, Go to Actions on the upper-right of the screen, then Generate Report
-
Scheduling:
-
Daily – runs every day
-
Weekly – runs every Monday
-
Monthly – runs on the 1st of each month
-
Yearly – runs on January 1
-
Recipients receive the report by email according to the schedule.
-
-
View Blocked IP Addresses
See moreOverview
To review blocked IP addresses in your Timus network, navigate to Timus Manager > Insights > Blocked IP Addresses. Here you can:
-
See each blocked public IP and its associated user/administrator
-
View the IP’s Location, Time of block, and the Zero Trust policy that denied access
-
Adjust how long blocks remain active via the Settings button
This page centralizes all information on IPs blocked by risky login attempts and default sign-in policies, enabling efficient monitoring and management.
-
-
View User Activity
See moreTo view user activity on your corporate network, follow these steps:- Go to Timus Manager -> Users & Teams page and open the User tab.
- Find the user whose activities you want to see on the screen by clicking the ellipsis icon at the end of the line.
From this pop-up window, you can:
-
- View the user activity.
- Edit the user information.
- Delete the user from the network.
- Deactivate the user's account.
- Ban Login of the user.
- Reset Password of the user.
- Drop Connection of the user.
- Reset 2FA for the user.
- Click View in the window that opens.
- On this page, you can view all user activities on the network, including Behavior Analysis specified by the Most Signed-In Location, Device, and Time Ranges.
- You can view Events in a specific period using the Date/Time filter at the top right of the page.
- When you click on the Actions button at the top right of the page, you can perform the following actions for the user: Edit/Delete/Drop Connection.
-
View Active Devices
See moreThis article explains how administrators can easily monitor active devices connected to the Timus network.To monitor or remove an active device in your network, please follow the steps below:- Click on "Devices Online" in the Dashboard to go to the Devices page.
- Similarly, you can directly access the Devices page by clicking on it in the main navigation menu on the left.
- On this page, under the Status indicator, you will be able to see devices that are either online or offline.
You can Drop or manage the connection of any individual device or all devices associated with a user (for this, use the 'Bulk Actions' option for devices located on the right-hand side of the page).
Learn more about the device management.
-
Productivity Reports
See moreOverview
This article describes how to access and analyze Productivity Reports in Timus Manager. Once the Productivity Tracker is enabled and users are signed in to the Timus Connect App, navigate to Timus Manager > Insights > Productivity Reports to view:
-
Most Productive Users
-
Most Productive Teams
-
Most Used Applications
Each tab (Users, Teams, Applications) includes an Export button in the top-right corner—click it to open a download pop-up and save your report as a CSV file.
- Click the Users tab (shown below) to view user reports. Here, you can see Most Active Users, Productive Users, and Unproductive Users..
- After clicking Details for a user (as shown above), you will see the selected user’s information (as shown below).
- Click the Teams tab (shown below) to view Most Active Teams, Productive Teams, and Unproductive Teams.
- Click the Applications tab (shown below) to view Most Productive Applications, Unproductive Applications, and Neutral Applications.
-
-
View IPsec Logs
See moreOverview
This article provides instructions on how to view IPsec logs to troubleshoot IPsec site-to-site tunnels.- Please navigate to Timus Manager > Sites, then click the ellipsis (three dots) next to the gateway for which you wish to view IPsec logs.
- After clicking the gateway’s ellipsis, you will land on its View page; there, click the ellipsis in the top-right corner and choose View Connector Logs to access the IPsec logs.
- Please note that the IPsec logs refresh automatically every three minutes.
- After selecting View Connector Logs, you will see the logs for the IPsec tunnel you are establishing.
If you encounter an error while creating an IPsec tunnel, please refer to our IPsec Error page for assistance.