Skip to main content
Skip table of contents

UCX Suite Audit Trails Management

Introduction

Imagicle UCX Suite can generate both a CSV file including major Audit events and it can send Audit events to an external SIEM (Security Information and Event Management) by leveraging Syslog protocol.
Both above audit methods are accessible by Users with Complete User Management role, by clicking on Administration → Audit Trail web menu. 

Enable and configure CSV-based Audit Trail

Auditing is disabled by default. It can be enabled accessing the Audit Trail menu and flagging the relevant checkbox, then saving.

Once Auditing has been enabled, is it not possible to disable it, for security reasons. Please contact Imagicle Support for more details.

image-20250113-113001.png

Data retention period in days is configurable. If left to 0, the retention is unlimited and it might impact DB storage.

Data purge (audit events and login/logout events) is automatically performed every 24 hours, at 01:30 am (not configurable).

Login/logout Audit Events

Auditing is tracking all accesses to Imagicle web portal, Imagicle gadgets and UCX Console, including the following authentication type: SSO, AD/LDAP, CUCM, Windows Integrated, Local user

The login / login failed / logout auditing records the following info:

Audit event

Application

Action

Username

Client IP

Authentication type

Long session

Login from Suite Web portal or gadgets

Suite

User login

the username

client’s IP address

the authentication type

true if a long session has been started, false otherwise

Login from UCX Console

UCX Agent/Attendant Console

User login

the username

Workstation IP address

the authentication type

false

Login failed from Suite Web portal or gadgets

Suite

User login failure

the username entered for the login attempt

client’s IP address

the authentication type

Login failed from UCX Console

UCX Agent/Attendant Console

User login failure

the username entered for the login attempt

Workstation IP address

the authentication type

Logout from Suite Web portal or gadgets

Suite

User logout

the username

client’s IP address

Logout from UCX Console

UCX Agent/Attendant Console

User logout

the username

Workstation IP address

Notes

  • There is no distinction between login events on the web portal and on the gadgets.

  • Only actual logins are traced: no new events are audited if a user accesses the portal/gadget again within the session timeout (i.e. after the first time he doesn’t need to log in again)

  • Currently no login events are traced for Imagicle One Desktop or Print To Fax.

  • Login failure events only track failed attempts for incorrect password, not for invalid user name

  • Internal service-to-service authentications are not expected to be present in audit log

Download

In case audit is enabled, a new “Download audit logs” section appears in its configuration page, as per below.

image-20250113-113033.png

from this page you can download a CSV file including all recorded audit events, optionally filtered by:

  • time

  • tenant (only in case of multi-tenant installations)

  • applications

CSV file format as follows:

  • Application Id: UCX application ID for the event

  • Timestamp (Server Time Zone): time when the event occurred

  • Username: Username of the event user 

  • First name: Name of the event user 

  • Last name: Surname of the event user 

  • Tenant: Tenant of the event user 

  • Action: Type of action (i.e. Play recording)

  • Client IP: workstation IP where the action causing the audit event was made

  • UCX Suite Node: node where the action causing the audit event was made

  • Details: Details of the particular event.  "Details" column format changes according to the specific event (i.e. for an "Un-preserve recording" event the format is as follows:

CODE
Recording Id {c333d58a-7ba6-4d69-91e4-175816aa5d0b}, Recording PBX Call Id {28787197}, Recording duration {00:00:01.9674372}, Recording Ref. Number {2019000000003}, Recording start time (Server Time Zone) {2019-01-07T11:18:16.1670000+01:00}, Recording owner username {u205}, Recording owner first name {Utente}, Recording owner last name {Duecentocinque}, Recording group {Group1}

In case of scheduled reports, audit is generated only if UCX Suite outbound email notifications are enabled and an actual email is sent.

Enable and configure Syslog-based Audit Trail

Syslog Auditing is disabled by default. It can be enabled by accessing the Audit Trail menu and flagging the relevant checkbox, then saving.

image-20260325-095732.png

The following parameters must be added, before enabling the feature:

  • Enable: Toggle on the Syslog events sending

  • Host: SIEM Server’s IPv4 or IPv6 or FQDN

  • Protocol: you can choose among UDP, TCP or TCP-TLS

  • Port: Transport port used by the SIEM appliance

  • Message format: Choose between JSON or CEF, depending on SIEM support.

Once Syslog Audit has been enabled, is it not possible to disable it, for security reasons. Please contact Imagicle Support for more details.

image-20260325-100829.png

A Send test message button is available, to immediately check SIEM server reachability. This button works for TCP and TCP-TLS transport protocols only. Test message is not formatted as CEF or JSON: it just includes a test string. 

Successful test result

image-20260325-101100.png

Unsuccessful test result

image-20260325-101316.png

Before enabling Syslog Audit leveraging TCP-TLS transport, please make sure SIEM server includes a trusted Digital Certificate. If not, then please contact Imagicle Support to enable Self-Signed certificates acceptance.

SIEM Efficiency caveats

If the SIEM does not promptly “digest” Audit events sent by Imagicle UCX Suite, it might happen that some events are lost. If this is happening, it is possible to tweak the events' queue size and the retry interval. Please contact Imagicle Support for more details.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.