Application Access Log

Application Access Log

This KB article describes the information listed on this page and how to manage them. 

The LOGS & REPORTS > Application Access Log page lists the users who remotely accessed corporate resources. 

Application Access Logs

The following information is listed under this section:

Access Date – The date the resource was accessed in the YYYY-MM-DD HH:MM:SS format.

Username – The username of the user who accessed the resource.

Public IP – The public IP address of the user.

Country – The name of the country where the user accessed the resource from. 

Destination IP – The internal IP address of the resource.

Port – The port number of the resource.  

Action – Allowed or Denied. 

View Application Access Log

The drop-down at the top of the page has options to view the log by Today, Week, Month, and Date Range


Download Application Access Log List 

ISA web portal administrators can download the complete list of application access by Today, Week, Month, and Date Range and click the CSV button at the top of the page. An email with the link to download the file in CSV format is sent to the logged-in administrator’s email address. The file has the following information:

  • Access Date – The date the resource was accessed in the YYYY-MM-DD HH:MM:SS format.

  • Username – The username of the user who accessed the resource.

  • Public IP – The public IP address of the user.

  • Country – The name of the country where the user accessed the resource from. 

  • Destination IP – The internal IP address of the resource.

  • Port – The port number of the resource.  

  • Action – Allowed or Denied.


  1. Click the CSV button.



  1. A message that an email is scheduled to be sent to the administrator’s email address is displayed. 



  1. Click Download File within the email.



  1. View the file in a spreadsheet application.


Sorting the Application Access Log

You can sort the list by Public IP, Country, Destination IP, Port, or Action. Click the up/down arrow alongside respective header fields. 

Conclusion

The Application Access Log is useful for the ISA web portal administrators to track user access to corporate resources. 


    • Related Articles

    • Access Log

      This KB article describes the information listed on the Access Log page and how to manage them. The LOGS & REPORTS > Access Log page lists the ISA web console login sessions. Each entry on the page contains the username of the user, the page on the ...
    • ISA App Log File

      The ISA App, once successfully installed and configured, generates Connection Logs that could be extremely helpful in troubleshooting issues that may crop up. Depending on the device OS, the Log File location is as follows: Locating the ISA App Log ...
    • InstaSafe Secure Access Architecture

      Product Overview InstaSafe Secure Access (ISA) is an innovative enterprise remote access software solution based on software defined perimeter delivered as a service. It provides enterprises a simplified setup to secure and manage application access. ...
    • Uninstall the ISA App from Linux (CLI)

      This Article provides guidance on how to uninstall the ISA App from Linux CLI. The User must have sudo access to the system in order to uninstall the ISA App. Step 1: Stop the InstaSafe Service Run the command 'sudo service instasafe stop' Step 2: ...
    • Uninstall the ISA App from macOS

      This Article provides guidance on how to uninstall the ISA App from macOS. Step 1: Exit the ISA App In case the ISA App is still running, 'Disconnect' and 'Exit' from the Notifications Area of the Taskbar. Step 2: Uninstall the ISA App Open Terminal, ...