Understanding the Activity Log in the Firewall Panel
Understanding the Activity Log
The Activity Log keeps track of every administrative action performed on your Firewall Panel account. It provides transparency by showing what changes were made, when they happened, and who performed them.
This is especially useful for troubleshooting connection issues, auditing changes, and monitoring security activity.
What the Activity Log Shows
Each entry in the Activity Log includes:
- Time → The exact timestamp when the action occurred.
- Action → The type of action (e.g., Filter Applied, Filter Removed, Profile Applied, IP Assigned).
- Performed By → Identifies the user or administrator who made the change.
- Filter Details → Protocols, ports, and rule information affected by the action.
- IP Address → The IP on which the action was applied.
- Description → A short summary of the action taken.
Common Activity Types
- Filter Applied / Removed → A specific rule was added or deleted (e.g., block TCP 22, allow UDP 27015).
- Profile Applied / Removed → A predefined profile preset was applied (e.g., CS2, FiveM, ARK) was enabled or disabled.
- IP Assigned / Unassigned → An IP address was assigned or unassigned from the Firewall Panel.
- Administrative Actions → System-level updates, often performed automatically.
How to Use the Activity Log
- Troubleshooting Connectivity
If your server becomes unreachable after changes, check if a filter or profile was applied incorrectly.
- Audit & Security
See which user applied or removed filters. This helps identify mistakes or suspicious changes.
- Reverting Changes
If a service stopped working after a rule change, use the log to identify and remove the problematic filter.
Pro Tips
- Use the timestamps to track exactly when issues started.
- Cross-check Attack Logs with the Activity Logs to see what actions were taken during or after an attack.
- If a member of Staff is making any changes, the Performed By field helps track accountability.
Updated on: 27/09/2025
Thank you!