add the ability to audit login failures/successes for logging in to the web interface

Avatar
  • updated
  • Completed

add the ability to audit login failures/successes for logging in to the web interface

Duplicates 4
Notification on failed and successful logins

Partner stated that he would like a email notification when there is a successful or failed login

Log site logins with notification capabilities

From CW#7590390:

Would like to be able to audit when users login to ScreenConnect instance, including failures. Would also like to be able to receive email notifications when failed login attempts occur on site.

Audit logs of when someone logs on (successfully or failure) into the web interface?

Hello

When someone logs on to the web interface, Id like to log it and send it to a syslog ( more specifically Elastic Stack ) to not only keep logs but to meet certain compliance requirements.

We have ScreenConnect ( or ConnectWise ) installed on Windows on prem.

Where are these audit logs located?

Thank you

log user login history

Please add this feature that can log user login history for audit and investigation.

Avatar
1
anonymous
  • Planning
Avatar
1
anonymous
  • Under Review
Avatar
2
Mike Bannerman Team Member
  • Considering for Future Release
Avatar
1
brad

Seems like a no-brainer.

We have no way, from Screen Connect server, to determine if we are getting brute forced or not. 

Avatar
4
David T

Still pending on this one? Maybe this should be moved up in the list now that you're enforcing 2FA and strongly encouraging use because of all the MSP targeted hacking going on of late. 

Avatar
3
Cody Arnold

I second this.

We'd love to see a way that we can look through logs so we can block offenders that are attempting to abuse the system.

For some organizations this would be a dealbreaker not having audit logs for failed logon attempts.

Avatar
8
David T

...an argument could be made that the lack of an audit log makes use of Connectwise Control in Healthcare (HIPAA regulated) and Financial Services (Sarbanes-Oxley regulated) illegal and in violation of their respective requirements of: Maintain and auditing access logs.

https://www.securitymetrics.com/blog/what-are-hipaa-compliant-system-logs

Event, audit, and access logging are required for HIPAA compliance. HIPAA requires you to keep logs for at least six years. These three HIPAA requirements apply to logging and log monitoring:

  • § 164.308(a)(5)(ii)(C): Log-in monitoring (Addressable). [Implement procedures] for monitoring log-in attempts and reporting discrepancies.
  • § 164.312(b): Audit controls (Required). Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ePHI.
  • § 164.308(a)(1)(ii)(D): Information system activity review (Required). Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.
Avatar
2
Caitlin M Barnes Team Member
  • Roadmapped
Avatar
6
Dave Warner

How is this not a thing yet? This is a feature I would have expected to be standard by now, especially with all of the MSP hijacking going on lately. Being able to track login attempts by IP I would consider essential, seems like it shouldn't be too difficult to implement given that we already get notified of successful sign-ins from new locations.

Avatar
3
Scott D

Yea, this has got to be an option ASAP! Otherwise we will have to move to a different solution!



Top contributors

Avatar
Avatar
Avatar
Avatar
Avatar
Avatar
Avatar
Avatar
Avatar
Avatar
Avatar
Avatar
Avatar
Avatar
Avatar