Agent Login History and Audit Trail
Overview
Velaro maintains a complete audit trail of all agent logins and administrative actions. This gives you visibility into who accessed the system, from where, and what they changed — essential for security reviews, compliance audits, and incident investigation.
Viewing Agent Login History
Go to Reports → Activity Log → Agent Login History. Each row shows:
- Agent name and email
- Login timestamp
- IP address
- Device type (desktop / mobile / tablet)
- Browser and OS
- Session duration
- Logout time (if a clean logout was performed)
Administrative Audit Log
Under Reports → Activity Log → Admin Actions, see every configuration change made by admin users:
- Bot edits (who changed the system prompt and when)
- Integration connections and disconnections
- Routing rule changes
- Agent invitations and permission changes
- Knowledge base article edits
Filtering and Search
Filter log entries by date range, agent, action type, or IP address. Export any view as CSV for compliance documentation or security incident review.
Suspicious Login Detection
Velaro flags logins from new IP addresses or unusual locations in the Activity Log with a warning icon. Admins can see at a glance if any agents have logged in from unexpected locations and take action if needed.
Retention
Login history and audit logs are retained for 90 days on standard plans. Contact support for extended retention options on Enterprise plans.
Was this article helpful?