Alerts
The Alerts tab displays system-generated alerts from your tiCrypt deployment. Alerts are triggered by notable events such as unusual login activity, hash mismatches, user state changes, and security incidents.
Viewing Alerts
Each alert shows:
- Severity (color-coded indicator)
- Name of the alert
- Timestamp when the alert was generated
- Object involved (user, resource, or action target)
- Description with alert-specific details
Click any alert to view additional details.
Filtering Alerts
Use the filter dropdown to narrow results by severity, type, or user.
By Alert Severity
Filter alerts by severity level:
| Severity | Color | Description |
|---|---|---|
| Info | Blue | Informational events requiring no action |
| Low | Green | Minor events worth noting |
| Medium | Yellow | Events that may require review |
| High | Orange | Significant events requiring attention |
| Critical | Red | Urgent events requiring immediate action |
By Alert Type
Filter by specific alert category. Available types include:
- IP Alert — unusual login location or distance between consecutive logins
- Hash Alert — mismatch between calculated and expected hash values
- User Locked — account locked due to a security event
- User Added — a new user account was created
- State Changed — a user's account state was modified
- Role Changed — a user's role was modified
By User Performing Action
Search for a specific user using the autocomplete field. The list filters to show only alerts associated with that user's actions.
Refreshing Alerts
Click the Refresh button to reload the alert list with the latest data.