Skip to main content
The Admin Dashboard gives firm principals and IT administrators a centralized view of platform health, team activity, and security posture. Access it from the left sidebar under Admin.
The Admin Dashboard is restricted to users with the Admin role. Managers can view activity statistics, but system configuration and advanced operations require Admin access.

Dashboard Overview

The main dashboard displays four summary cards at the top:
CardWhat It Shows
System StatusOverall platform health — Healthy (green), Warning (amber), or Critical (red)
Security ScoreA 0–100 score based on email verification rates and password security across your team
Active UsersNumber of team members active in the last 30 days
Daily ActivityCount of actions performed today
Below the summary cards, three sections provide quick situational awareness: System Health:
ServiceStatus Indicators
DatabaseConnected / Disconnected
API ServicesRunning / Degraded
File StorageAvailable / Unavailable
EmailOperational / Delayed
Recent Alerts — system-generated notices such as email delivery delays, pending security scans, or overdue backups. Quick Actions:
ActionWhat It Does
Database BackupInitiates an on-demand database backup
Security ScanRuns a vulnerability scan across the platform
User ManagementNavigates to Settings > Team
System ConfigNavigates to the configuration editor
Screenshot of Admin Dashboard Overview

Dashboard Tabs

The Admin Dashboard is organized into specialized tabs. Click a tab to switch between views.

Database Health

The Database tab provides real-time insight into your PostgreSQL database:
MetricDescription
Connection StatusWhether the database is connected and responding
Database SizeEstimated total size of all tables and indexes
Active ConnectionsCurrent number of open database connections
Table StatisticsRow counts for key tables — users, organizations, projects/engagements
Screenshot of Database Health Tab

Security Audit

The Security tab surfaces potential security concerns:
SectionWhat It Shows
Failed Login AttemptsRecent failed sign-in attempts with timestamps and IP addresses
Suspicious ActivitiesUnusual access patterns (e.g., multiple failed attempts from same IP, access from new locations)
User Activity SummaryPer-user breakdown of recent actions, last login, and security status
Use this tab to monitor for unauthorized access attempts and ensure team members are following security best practices (2FA enabled, strong passwords, etc.). Screenshot of Security Audit Tab

Analytics

The Analytics tab provides usage trends and adoption metrics:
1

Select a Time Period

Choose from 7 days, 30 days, or 90 days using the period selector at the top.
2

Review Daily Activity Trends

A line chart shows the number of actions performed each day across the selected period. Spikes indicate high-activity days (e.g., assessment deadlines).
3

Review Feature Usage

A breakdown of actions by type shows which features your team uses most:
  • Assessment views and edits
  • File uploads and downloads
  • Comment activity
  • Task creation and completion
  • Report exports
4

Review Assessment Status Distribution

A summary shows how many assessments are in each status:
StatusDescription
DraftAssessment created but not started
In ProgressActively being worked on
CompletedAll requirements evaluated
Screenshot of Analytics Tab

Logs

The Logs tab provides access to system log files for troubleshooting:
FeatureDescription
Log EntriesFilterable list of system events
Level FilterFilter by severity: Error, Warning, Info, Debug
Date RangeRestrict logs to a specific time window
SearchFull-text search across log messages
Log StatisticsCounts of errors, warnings, and info messages for the selected period
Auto-RefreshToggle automatic log refresh for real-time monitoring
Screenshot of Log Management Tab

Two-Factor Authentication Management

The 2FA tab allows administrators to view and manage two-factor authentication across the organization:
  • View which team members have 2FA enabled
  • Monitor 2FA adoption rates
  • Enforce 2FA policies

Activity Logs

Activity logs track every action performed by every user in your organization. Navigate to the activity logs via the Admin Dashboard or Settings > Activity.

What’s Logged

Every significant user action creates an activity log entry:
CategoryExample Actions
AuthenticationLogin, logout, failed login, password change
AssessmentsView, create, edit, delete, export
FilesUpload, download, delete, scan
CommentsCreate, edit, delete, resolve
TasksCreate, update, complete, assign, delete
CalendarCreate event, update event, delete event
UsersInvite, role change, remove
SettingsConfiguration changes, security updates

Activity Log Entry

Each log entry contains:
FieldDescription
ActorWho performed the action (name and email)
ActionWhat was done (e.g., “assessment_view”, “file_upload”)
ResourceWhat was affected (type and ID)
TimestampWhen the action occurred
IP AddressSource IP address
User AgentBrowser and device information

Filtering Activity Logs

FilterOptions
UserFilter by specific team member
ActionFilter by action type
Resource TypeFilter by resource category (assessment, file, task, etc.)
Date RangeLimit results to a specific time window

Activity Statistics

Admins and Managers can view aggregate activity statistics:
MetricDescription
Total ActionsAll-time action count
Last 24 HoursActions in the past day
Last 7 DaysActions in the past week
Active UsersUnique users who performed actions recently
Actions by TypeBreakdown of most common actions
Actions by ResourceBreakdown by resource category
Actions by UserPer-user action counts
Recent ActionsTimeline of the latest actions with user names
Screenshot of Activity Statistics

Audit Trail

The audit trail provides a detailed, field-level record of every change made to assessment data. This is critical for demonstrating assessment integrity during QA reviews and PCI council audits.

Accessing the Audit Trail

There are two ways to access the audit trail:
  1. From the Assessment Workbench — click the Audit Trail tab in the right side panel to see changes for the current assessment
  2. From the Admin Dashboard — view organization-wide audit data

What the Audit Trail Captures

FieldDescription
UserWho made the change (name, email, avatar)
ActionType of change (create, update, delete)
Entity TypeWhat was changed (assessment answer, finding, comment, etc.)
TimestampExact date and time of the change
Field NameSpecific field that was modified (with PCI DSS requirement label)
Old ValuePrevious value before the change
New ValueNew value after the change
SnapshotFull state of the assessment at the time of the change
IP AddressSource IP and user agent for security

Viewing Assessment Audit History

1

Open an Assessment

Navigate to the assessment you want to audit.
2

Open the Audit Trail Tab

Click the Audit Trail tab in the right side panel.
3

Filter by Subsection

Select a specific requirement subsection to see only changes related to that requirement, or leave unfiltered to see all changes.
4

Review Changes

Each audit entry shows a diff-style view:
  • Changed field with its PCI DSS requirement label (e.g., “1.2.3 — Network Security Controls”)
  • Before value (red/struck through)
  • After value (green/highlighted)
  • Who made the change and when
Screenshot of Audit Trail Entries

Audit Statistics

The audit trail provides aggregate statistics per assessment:
MetricDescription
Total ChangesOverall change count
Changes by ActionBreakdown by create, update, delete
Changes by UserWho made the most changes (name, email, count)
Changes by SubsectionWhich requirements have the most activity
Recent ActivityTimeline of latest changes

Version History

For each requirement subsection, the audit trail maintains a version history:
1

Navigate to a Subsection

Select a requirement in the Assessment Workbench.
2

Open Version History

In the Audit Trail tab, click View History for the selected subsection.
3

Review Versions

Each version shows:
  • Version number (sequential)
  • Timestamp of the change
  • Author who made the change
  • Action performed
  • Full snapshot of the subsection data at that point in time
  • Diff showing what changed from the previous version
4

Rollback (if needed)

Select a previous version and click Rollback to restore the subsection to that state. The rollback itself is logged as a new audit entry.
Rollback replaces the current field values with the snapshot from the selected version. This action is logged and auditable but should be used carefully — it overwrites any changes made after the selected version.

Server Monitoring

For organizations with dedicated infrastructure, the Server Monitor page provides real-time system metrics:
MetricWhat It Shows
CPU UsageCurrent processor utilization percentage
Memory UsageRAM consumption and available memory
Disk UsageStorage consumption and remaining capacity
NetworkInbound and outbound network traffic
Process UptimeHow long the server has been running since last restart
Access the server monitor from Admin > Server Monitor in the left sidebar. Screenshot of Server Monitor

System Configuration

System configuration is restricted to Super Admin accounts. This section applies only to platform administrators at Kliper.
Super Admins can toggle platform-wide settings:
SettingCategoryDescription
Registration EnabledSecurityAllow new user sign-ups
Email VerificationSecurityRequire email verification for new accounts
Two-Factor AuthSecurityEnforce 2FA for all users
Maintenance ModeSystemPut the platform in read-only maintenance mode
Stripe EnabledIntegrationsEnable/disable Stripe billing
GitHub EnabledIntegrationsEnable/disable GitHub OAuth
Google EnabledIntegrationsEnable/disable Google OAuth
Access via Admin > Configuration in the left sidebar.