School Loop automatically logs most account activity by users and machines. These logs can be used by school admins to track down problems such as a student sending inappropriate messages or for documenting account usage. This article shares the process of tracking user activity with a fictitious example.
DISCLAIMER: The personal contact information in this article is fictitious and is purely meant for instructional purposes.
A student reports that another student, Jessie Abanto, sent an inappropriate message with the subject “Hey Dude!”. Follow these steps to verify this claim:
- Log into your School Loop account as school admin.
- Search for the user Jessie Abanto via User Management.
- Click the user's name to see their Account page.
- Look for the User History and Account History buttons for the user as pictured below.
After auto-logging into both student accounts and inspecting their LoopMail messages, it is clear that the message was sent from the account of Jessie Abanto, as seen in the screenshot below:
However, Jessie’s mom claims that her daughter was in the middle of a soccer game that evening and could not possibly have sent that message.
School Loop not only logs activity by a user but also by Machine and IP address. Your IT department can determine if the IP address is used by the school but typically cannot pinpoint a particular computer.
Machine addresses, on the other hand, are unique to every computer on the planet and could be used to track down a particular computer. Click on the Research Machine button to view Machine History.
The Machine History logs indicate that the inappropriate message was sent from Jessie Abanto account, but a close comparison of timestamps in the User History and Machine History reveal some interesting details.
It appears that Phat Pham was on this particular computer logging in at 4:47 PM. Because of the timestamps, it seems that Phat Pham was logging in as Jessie while she was at her soccer game.
Although history logs are powerful tools to track user activity, there is no substitute for defining a clear use-policy and keeping a vigilant check.
Additionally, in some cases, it is essential to know who has been making changes to a particular account. You can click the Account History button for this information.