Admins Action History Documentation¶
Menu Location: Settings > System > Admins Action History
Access Level: Administrator and above
Last Updated: 2026-03-01
Overview¶
The Admins Action History page provides a complete audit trail of all administrative user actions within the system. This critical security and compliance tool tracks who did what, when they did it, and from where, enabling accountability, troubleshooting, and security monitoring.
Primary Functions:
- Track all admin user actions system-wide
- Audit sensitive operations (payment processing, order modifications, customer data changes)
- Investigate issues and trace changes
- Monitor security and detect suspicious activity
- Generate compliance reports for auditors
- Identify training needs based on user patterns
Page Layout¶
Header Section¶
- Date Range Selector: Filter by action date/time
- Admin User Filter: Select specific administrator
- Action Type Filter: Filter by operation category
- Search Box: Find specific actions or affected records
Main Content Area¶
Chronological log table showing admin actions with timestamp, user, action type, affected record, IP address, and details.
Summary Dashboard¶
- Total actions in period
- Most active administrators
- Most common action types
- Security alerts or flagged activities
Report Data & Columns¶
| Column | Description | Source |
|---|---|---|
| Timestamp | Exact date and time of action | System clock (timezone aware) |
| Admin User | Who performed action | Logged-in admin account |
| Action Type | Category of action | System classification |
| Description | What was done | Human-readable summary |
| Affected Record | Customer, order, product, etc. | Linked record ID |
| IP Address | Where action originated | Network log |
| Success/Fail | Whether action completed | System status |
| Details | Additional context | JSON data or notes |
Filters & Search Options¶
Time Filters¶
- Date Range: Specific start/end dates
- Quick Ranges: Today, Yesterday, Last 7 Days, Last 30 Days, This Month
User Filters¶
- Admin User: Select specific staff member
- Admin Role: Filter by role (Manager, Admin, Kiva Admin)
- All Users vs Active Only: Include or exclude deactivated admins
Action Filters¶
- Action Categories:
- Customer Changes (edits, deletions, credits)
- Order Modifications (edits, cancellations, refunds)
- Product Updates (pricing, inventory, availability)
- Payment Processing (charges, refunds, manual payments)
- System Settings (configuration changes)
- Report Exports (data downloads)
- Security Events (logins, failed attempts, permission changes)
Status Filters¶
- Success Only: Completed actions
- Failed Only: Errors or blocked attempts
- Flagged for Review: Suspicious or high-risk actions
Common Use Cases¶
Use Case 1: Investigate Customer Complaint¶
Goal: Determine what changes were made to customer account
Steps:
- Search for customer name or ID
- Review all actions affecting this customer
- Check timestamps against complaint timeline
- Identify which admin made which changes
- Review action details for context
- Address issue or correct error
Example: Customer complains about unexpected charge on March 15. Search shows Admin Sarah processed manual payment $45 at 2:13 PM. Review notes: "Per customer phone request - makeup payment for Feb order." Contact Sarah to verify; was legitimate customer authorization.
Use Case 2: Security Audit¶
Goal: Review admin access patterns for suspicious activity
Steps:
- Set date range to last 30 days
- Review "Security Events" category
- Check for:
- Failed login attempts (brute force?)
- Unusual login times (3 AM access?)
- Login from unexpected IP addresses
- Multiple rapid permission changes
- Investigate any anomalies
- Document findings for security review
Use Case 3: Training Identification¶
Goal: Identify staff needing additional training
Steps:
- Filter to specific admin user
- Review their actions over last month
- Check for:
- High rate of failed actions (errors)
- Repeated similar mistakes
- Actions later reversed by others
- Schedule one-on-one training
- Follow up with review in 30 days
Use Case 4: Compliance Reporting¶
Goal: Generate audit trail for compliance review
Steps:
- Set date range to audit period (quarter or year)
- Filter to sensitive action categories:
- Payment processing
- Customer data exports
- Pricing changes
- Refunds over threshold
- Export complete log
- Provide to auditors or compliance team
- Respond to any questions with detailed action records
Use Case 5: Tracing Data Change¶
Goal: Find out when and why product price changed
Steps:
- Navigate to product in question
- Search action history for product ID or name
- Filter to "Product Updates" category
- Review chronological list of all changes
- Identify price change timestamp and admin
- Review details to understand reason
- Verify change was authorized
Troubleshooting¶
Cannot Find Expected Action¶
Check:
- Expand date range (may be outside selected period)
- Verify search term spelling
- Check if action was by different admin than expected
- Some automated actions may not log (system-generated)
- Check action type filter isn't excluding it
Too Many Results to Review¶
Solutions:
- Narrow date range
- Filter to specific admin user
- Filter to specific action type
- Use search for affected record ID
- Export and analyze in Excel
IP Address Shows Internal Address¶
Explanation: Admin accessing from internal network shows local IP. Not a problem unless all show same IP (may indicate proxy/load balancer logging issue).
Related Pages¶
- Admin User Management - Manage admin accounts and permissions
- System Settings - Configuration changes tracked in log
- Security Settings - Login policies and access controls
- Customer Activity Log - Customer-initiated actions (separate from admin actions)
Permissions & Access¶
Required Access Level: Administrator or higher
Access Level Capabilities:
- Administrator: View all actions, export logs, review security events
- Kiva Admin: All features + access to system-level technical logs
Best Practices¶
Regular Monitoring¶
- Review action history daily for high-volume operations
- Check security events weekly for suspicious patterns
- Monthly audit of sensitive actions (payments, exports)
- Quarterly compliance review with full export
Security Vigilance¶
- Investigate failed login attempts immediately
- Review after-hours access monthly
- Verify unexpected IP addresses
- Monitor actions by recently terminated staff
- Alert on high-risk actions (bulk deletions, permission changes)
Things to Avoid¶
- Don't ignore failed action patterns (may indicate attacks)
- Don't assume all actions are authorized (verify high-risk changes)
- Don't delete audit logs (legal/compliance requirement to retain)
- Don't grant unnecessary admin access (limits audit effectiveness)
Quick Reference Card¶
| Task | Action/Location |
|---|---|
| Find customer changes | Search customer name, filter to Customer Changes |
| Review admin's recent actions | Filter to admin user, last 7 days |
| Security audit | Filter to Security Events, last 30 days |
| Trace price change | Search product ID, filter to Product Updates |
| Export for compliance | Apply filters, click Export |
| Check failed logins | Filter to Security Events, Status: Failed |
| Daily review | Date: Today, review all categories |
FAQs¶
How long are action logs retained?¶
Typically 1-7 years depending on compliance requirements. Check with administrator for your specific retention policy.
Can admin users delete their own action history?¶
No - audit log is immutable for security and compliance. Only system administrators can archive very old logs per retention policy.
Do automated system actions appear in this log?¶
Some do, some don't. Focus is on human admin actions. System background jobs may have separate technical logs.
Can I see customer actions here?¶
No - this shows admin staff actions only. Customer self-service actions tracked in Customer Activity Log.
What happens if I see unauthorized actions?¶
Immediately report to security team and management. Document what you found. Change passwords. Review access permissions.
Can I export audit logs for external review?¶
Yes, with Administrator access. Export full logs for compliance audits, investigations, or security reviews.
Change Log¶
2026-03-01¶
- Initial documentation created
End of Documentation
For additional help, contact your system administrator or Kiva Logic support.