Skip to main content

Alerts

The Alerts tab displays system-generated alerts from your tiCrypt deployment. Alerts are triggered by notable events such as unusual login activity, hash mismatches, user state changes, and security incidents.

Viewing Alerts

Each alert shows:

  • Severity (color-coded indicator)
  • Name of the alert
  • Timestamp when the alert was generated
  • Object involved (user, resource, or action target)
  • Description with alert-specific details

Click any alert to view additional details.

Filtering Alerts

Use the filter dropdown to narrow results by severity, type, or user.

By Alert Severity

Filter alerts by severity level:

SeverityColorDescription
InfoBlueInformational events requiring no action
LowGreenMinor events worth noting
MediumYellowEvents that may require review
HighOrangeSignificant events requiring attention
CriticalRedUrgent events requiring immediate action

By Alert Type

Filter by specific alert category. Available types include:

  • IP Alert — unusual login location or distance between consecutive logins
  • Hash Alert — mismatch between calculated and expected hash values
  • User Locked — account locked due to a security event
  • User Added — a new user account was created
  • State Changed — a user's account state was modified
  • Role Changed — a user's role was modified

By User Performing Action

Search for a specific user using the autocomplete field. The list filters to show only alerts associated with that user's actions.

Refreshing Alerts

Click the Refresh button to reload the alert list with the latest data.