SecureLink Admin Log and Best Practices

SecureLink offers features and capabilities that help monitor your environment so that it’s one less thing you have to continuously keep track of. The SecureLink Admin Log and Best Practices Checklist features help consolidate visibility into your server’s events, configurations, and status updates, and ultimately help you create a more straightforward process. Keep reading to see how these features and functionalities can help you!

Admin Log

The SecureLink Admin Log is a centralized place for SecureLink administrators to get an overarching view of both System Messages and User Activity. This means that as a SecureLink admin, you are able to look into the history of the end user of your choosing to make sure all actions are fully audited. This log can be filtered by individual users and the actions they take in the system. For example, you can filter by objects that have been deleted, and the system will give you the who-and-when of these specific actions. These quick filters assist you in being able to efficiently find what you are looking for.

While the Admin Log currently provides multitudes of data points, we aren’t resting on our laurels when it comes to this functionality. We are continuously iterating on the Admin Log by adding more filter options and more data points, and improving the interface and overall user experience of the feature to assist you in your continued administration and ownership of SecureLink.

Best Practices Checklist

Our Best Practices Checklist feature is a comprehensive security checklist score of your SecureLink configurations. It allows you to make adjustments to your system to match best practices and applicable compliance requirements directly from SecureLink. This is a quick way to get a high level overview of how secure your environment is when compared against the best practices of HIPAA, PCI, NERC, CJIS, and SecureLink.

Similar to the Admin Log, we have continued to improve the Best Practices Checklist over the last few months in order to provide system administrators with more visibility into your system and assist you with keeping your system safe and compliant with minimal effort.

  • We have added in checks for redundancy across the product, so whether it is from a Gateway/Gatekeeper perspective or server redundancy as a whole, we want to make sure you are aware of all failover options available to you in your system at any given time.
  • When it comes to credentials, we have added in checks for all credential vault functionality that is in-use. This means SecureLink will continuously monitor your credentials whether it’s in the form of third party credential vault integration or SecureLink’s locally managed credential vault.
  • Lastly, we’ve added clearer descriptions of the checks and mitigation steps for checklist items to create a more polished user experience.

Our overall goal with these updated configuration changes is to create a more streamlined process for you, the system admin, to efficiently manage your system with the click of a button.

All in all, the Admin Log and Best Practice Checklist features are there to act as at-a-glance guides for everything you need to know about your users and compliance of your SecureLink instance. As an owner of SecureLink we want to make sure you are provided with all the necessary information to make your administration role as seamless and pain-free as possible.

close close