Home Reporting & Analytics Understanding Activity Logs

Understanding Activity Logs

Last updated on Apr 17, 2026

Understanding Activity Logs

Activity Logs are the most detailed reporting tool in KyberGate. Every web request, every blocked page, every safety alert — it's all captured in the Activity Logs. Use them to investigate incidents, monitor student behavior, and verify your filtering policies are working correctly.

Before You Begin

  • You need Viewer, Teacher, or Admin role in KyberGate
  • Activity Logs are available in real-time — no delay between activity and log entry
  • Logs are retained for 90 days (configurable in Settings)

Accessing Activity Logs

  1. Navigate to Reports → Activity Logs in the dashboard
  2. You'll see a reverse-chronological list of all web activity

Log Entry Details

Each activity log entry includes:

  • Timestamp — exact date and time (in your school's timezone)
  • Student/Device — who and which device
  • URL — the full URL visited
  • Domain — the root domain
  • Category — content category (Gaming, Education, Social Media, etc.)
  • Action — Allowed, Blocked, or Bypassed
  • Policy — which filtering policy made the decision
  • Duration — how long the student spent on the page (estimated)

Filtering and Searching

The Activity Logs support powerful filtering:

Quick Filters

  • By student — Select a specific student or device
  • By action — Show only Blocked, Allowed, or Bypassed entries
  • By category — Filter to a specific content category
  • By date range — Set start and end dates
  • By keyword — Search within URLs or domain names

Advanced Filters

  • By device group — Filter by organizational unit
  • By policy — See activity under a specific filtering policy
  • By safety flag — Show only entries that triggered KyberPulse alerts
  • By AI activity — Filter to AI chat platform usage only

Common Use Cases

Investigating an Incident

  1. Filter by the specific student
  2. Set the date range to the incident timeframe
  3. Review the timeline of sites visited
  4. Click individual entries for full details
  5. Export the filtered results for documentation

Verifying a Policy Change

  1. Deploy a new filtering policy
  2. Filter Activity Logs by the affected device group
  3. Check that previously blocked sites are now allowed (or vice versa)
  4. Look for unexpected blocks that might indicate an overly aggressive policy

Monitoring AI Usage

  1. Filter by Type: AI Chat
  2. Review which AI platforms students are using
  3. Check conversation prompts for academic integrity concerns
  4. Generate a summary report for administrators

Exporting Activity Logs

  1. Apply your desired filters
  2. Click "Export" in the top right
  3. Choose format: CSV or PDF
  4. The export includes all filtered entries with full details
  5. Large exports are processed in the background — you'll receive a notification when ready

Tips

  • Use bookmarks: Save frequently used filter combinations for quick access
  • Check the "Blocked" view regularly: It shows you what students are trying to access that's being filtered — useful for identifying trends
  • Compare time periods: Look at activity logs from different weeks to spot changing patterns
  • Real-time monitoring: Keep Activity Logs open during class to see student activity as it happens

Troubleshooting

  • No logs showing? Check that devices are enrolled and routing through the proxy. Bypassed domains don't generate logs
  • Missing student name? The device may not be assigned to a student in KyberGate. Check Device Management
  • Logs seem delayed? Activity Logs are real-time, but the dashboard may need a refresh. Try reloading the page
  • Can't find a specific entry? Expand the date range and use the keyword search on the URL

Related Articles

  • Weekly Report Card
  • Student Risk Scoring
  • Exporting Reports to PDF