The Admin Dashboard gives firm principals and IT administrators a centralized view of platform health, team activity, and security posture. Access it from the left sidebar under Admin.
The Admin Dashboard is restricted to users with the Admin role. Managers can view activity statistics, but system configuration and advanced operations require Admin access.
Dashboard Overview
The main dashboard displays four summary cards at the top:
| Card | What It Shows |
|---|
| System Status | Overall platform health — Healthy (green), Warning (amber), or Critical (red) |
| Security Score | A 0–100 score based on email verification rates and password security across your team |
| Active Users | Number of team members active in the last 30 days |
| Daily Activity | Count of actions performed today |
Below the summary cards, three sections provide quick situational awareness:
System Health:
| Service | Status Indicators |
|---|
| Database | Connected / Disconnected |
| API Services | Running / Degraded |
| File Storage | Available / Unavailable |
| Email | Operational / Delayed |
Recent Alerts — system-generated notices such as email delivery delays, pending security scans, or overdue backups.
Quick Actions:
| Action | What It Does |
|---|
| Database Backup | Initiates an on-demand database backup |
| Security Scan | Runs a vulnerability scan across the platform |
| User Management | Navigates to Settings > Team |
| System Config | Navigates to the configuration editor |
Dashboard Tabs
The Admin Dashboard is organized into specialized tabs. Click a tab to switch between views.
Database Health
The Database tab provides real-time insight into your PostgreSQL database:
| Metric | Description |
|---|
| Connection Status | Whether the database is connected and responding |
| Database Size | Estimated total size of all tables and indexes |
| Active Connections | Current number of open database connections |
| Table Statistics | Row counts for key tables — users, organizations, projects/engagements |
Security Audit
The Security tab surfaces potential security concerns:
| Section | What It Shows |
|---|
| Failed Login Attempts | Recent failed sign-in attempts with timestamps and IP addresses |
| Suspicious Activities | Unusual access patterns (e.g., multiple failed attempts from same IP, access from new locations) |
| User Activity Summary | Per-user breakdown of recent actions, last login, and security status |
Use this tab to monitor for unauthorized access attempts and ensure team members are following security best practices (2FA enabled, strong passwords, etc.).
Analytics
The Analytics tab provides usage trends and adoption metrics:
Select a Time Period
Choose from 7 days, 30 days, or 90 days using the period selector at the top.
Review Daily Activity Trends
A line chart shows the number of actions performed each day across the selected period. Spikes indicate high-activity days (e.g., assessment deadlines).
Review Feature Usage
A breakdown of actions by type shows which features your team uses most:
- Assessment views and edits
- File uploads and downloads
- Comment activity
- Task creation and completion
- Report exports
Review Assessment Status Distribution
A summary shows how many assessments are in each status:| Status | Description |
|---|
| Draft | Assessment created but not started |
| In Progress | Actively being worked on |
| Completed | All requirements evaluated |
Logs
The Logs tab provides access to system log files for troubleshooting:
| Feature | Description |
|---|
| Log Entries | Filterable list of system events |
| Level Filter | Filter by severity: Error, Warning, Info, Debug |
| Date Range | Restrict logs to a specific time window |
| Search | Full-text search across log messages |
| Log Statistics | Counts of errors, warnings, and info messages for the selected period |
| Auto-Refresh | Toggle automatic log refresh for real-time monitoring |
Two-Factor Authentication Management
The 2FA tab allows administrators to view and manage two-factor authentication across the organization:
- View which team members have 2FA enabled
- Monitor 2FA adoption rates
- Enforce 2FA policies
Activity Logs
Activity logs track every action performed by every user in your organization. Navigate to the activity logs via the Admin Dashboard or Settings > Activity.
What’s Logged
Every significant user action creates an activity log entry:
| Category | Example Actions |
|---|
| Authentication | Login, logout, failed login, password change |
| Assessments | View, create, edit, delete, export |
| Files | Upload, download, delete, scan |
| Comments | Create, edit, delete, resolve |
| Tasks | Create, update, complete, assign, delete |
| Calendar | Create event, update event, delete event |
| Users | Invite, role change, remove |
| Settings | Configuration changes, security updates |
Activity Log Entry
Each log entry contains:
| Field | Description |
|---|
| Actor | Who performed the action (name and email) |
| Action | What was done (e.g., “assessment_view”, “file_upload”) |
| Resource | What was affected (type and ID) |
| Timestamp | When the action occurred |
| IP Address | Source IP address |
| User Agent | Browser and device information |
Filtering Activity Logs
| Filter | Options |
|---|
| User | Filter by specific team member |
| Action | Filter by action type |
| Resource Type | Filter by resource category (assessment, file, task, etc.) |
| Date Range | Limit results to a specific time window |
Activity Statistics
Admins and Managers can view aggregate activity statistics:
| Metric | Description |
|---|
| Total Actions | All-time action count |
| Last 24 Hours | Actions in the past day |
| Last 7 Days | Actions in the past week |
| Active Users | Unique users who performed actions recently |
| Actions by Type | Breakdown of most common actions |
| Actions by Resource | Breakdown by resource category |
| Actions by User | Per-user action counts |
| Recent Actions | Timeline of the latest actions with user names |
Audit Trail
The audit trail provides a detailed, field-level record of every change made to assessment data. This is critical for demonstrating assessment integrity during QA reviews and PCI council audits.
Accessing the Audit Trail
There are two ways to access the audit trail:
- From the Assessment Workbench — click the Audit Trail tab in the right side panel to see changes for the current assessment
- From the Admin Dashboard — view organization-wide audit data
What the Audit Trail Captures
| Field | Description |
|---|
| User | Who made the change (name, email, avatar) |
| Action | Type of change (create, update, delete) |
| Entity Type | What was changed (assessment answer, finding, comment, etc.) |
| Timestamp | Exact date and time of the change |
| Field Name | Specific field that was modified (with PCI DSS requirement label) |
| Old Value | Previous value before the change |
| New Value | New value after the change |
| Snapshot | Full state of the assessment at the time of the change |
| IP Address | Source IP and user agent for security |
Viewing Assessment Audit History
Open an Assessment
Navigate to the assessment you want to audit.
Open the Audit Trail Tab
Click the Audit Trail tab in the right side panel.
Filter by Subsection
Select a specific requirement subsection to see only changes related to that requirement, or leave unfiltered to see all changes.
Review Changes
Each audit entry shows a diff-style view:
- Changed field with its PCI DSS requirement label (e.g., “1.2.3 — Network Security Controls”)
- Before value (red/struck through)
- After value (green/highlighted)
- Who made the change and when
Audit Statistics
The audit trail provides aggregate statistics per assessment:
| Metric | Description |
|---|
| Total Changes | Overall change count |
| Changes by Action | Breakdown by create, update, delete |
| Changes by User | Who made the most changes (name, email, count) |
| Changes by Subsection | Which requirements have the most activity |
| Recent Activity | Timeline of latest changes |
Version History
For each requirement subsection, the audit trail maintains a version history:
Navigate to a Subsection
Select a requirement in the Assessment Workbench.
Open Version History
In the Audit Trail tab, click View History for the selected subsection.
Review Versions
Each version shows:
- Version number (sequential)
- Timestamp of the change
- Author who made the change
- Action performed
- Full snapshot of the subsection data at that point in time
- Diff showing what changed from the previous version
Rollback (if needed)
Select a previous version and click Rollback to restore the subsection to that state. The rollback itself is logged as a new audit entry.
Rollback replaces the current field values with the snapshot from the selected version. This action is logged and auditable but should be used carefully — it overwrites any changes made after the selected version.
Server Monitoring
For organizations with dedicated infrastructure, the Server Monitor page provides real-time system metrics:
| Metric | What It Shows |
|---|
| CPU Usage | Current processor utilization percentage |
| Memory Usage | RAM consumption and available memory |
| Disk Usage | Storage consumption and remaining capacity |
| Network | Inbound and outbound network traffic |
| Process Uptime | How long the server has been running since last restart |
Access the server monitor from Admin > Server Monitor in the left sidebar.
System Configuration
System configuration is restricted to Super Admin accounts. This section applies only to platform administrators at Kliper.
Super Admins can toggle platform-wide settings:
| Setting | Category | Description |
|---|
| Registration Enabled | Security | Allow new user sign-ups |
| Email Verification | Security | Require email verification for new accounts |
| Two-Factor Auth | Security | Enforce 2FA for all users |
| Maintenance Mode | System | Put the platform in read-only maintenance mode |
| Stripe Enabled | Integrations | Enable/disable Stripe billing |
| GitHub Enabled | Integrations | Enable/disable GitHub OAuth |
| Google Enabled | Integrations | Enable/disable Google OAuth |
Access via Admin > Configuration in the left sidebar.