Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Discuss
  3. Access monitoring (login events, suspicious activity detection)

Access monitoring (login events, suspicious activity detection)

Scheduled Pinned Locked Moved Discuss
4 Posts 3 Posters 80 Views 4 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • O Offline
    O Offline
    OrezBodajoy
    wrote last edited by
    #1

    I want to monitor access to my cloudron instance: login events and things like that.
    I also want to sometimes clean up all the currently valid credentials and check that there are no unexpected logons after that.

    I know that the event log has some lines in the ui related to logons but that's not practical enough for this use case.

    Any suggestions?

    1 Reply Last reply
    5
    • jamesJ james marked this topic as a regular topic
    • jamesJ james moved this topic from Support
    • O Offline
      O Offline
      OrezBodajoy
      wrote last edited by
      #2

      Any ideas?

      1 Reply Last reply
      0
      • girishG Offline
        girishG Offline
        girish
        Staff
        wrote last edited by
        #3

        @orezbodajoy Login events are in the Event log and I guess you can check those using the API for automation.

        As for "suspicious activity detection", I guess we have to implement such features in Cloudron. What is defined as a suspicious activity? Difference device or IP?

        1 Reply Last reply
        0
        • robiR Offline
          robiR Offline
          robi
          wrote last edited by
          #4

          Most of it can be mitigated by implementing the already available blacklist and whitelist.

          Conscious tech

          1 Reply Last reply
          1
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Don't have an account? Register

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • Bookmarks
          • Search