Learning and Support Docs

Learning and Support Docs

  • View as PDF

›Admin

Welcome

  • Supported Browsers and Operating Systems
  • Learning and Support Docs

Accounts

  • New Account
  • Logging In
  • Multi-Factor Authentication & SSO
  • Password Reset

Packages

  • Package Inbox
  • Creating & Modifying Packages
  • Creating a Package from a CSV File
  • Sharing Packages
  • Create Packages Using ALE

Upload/Download

  • Uploading and Tagging Files
  • Downloading
  • Video Specs

Searching Files

  • File Search
  • History

Viewing Files in Asset Viewer

  • Quick Guide to Asset Viewer
  • Asset & Package Viewer
  • Commenting
  • Asset Details Panel
  • File Info Panel
  • Viewer History Panel
  • Active Package Panel
  • Approval History Panel
  • Viewer Access Panel
  • Package Recipients Panel
  • Export Report Panel

Users

  • Manage Users
  • User Roles
  • User Lists

Admin

  • Tag Structure
  • Reporting
  • File Types
  • User Departments
  • Manage Company
  • Production Admin
  • Suspicious Activity
  • Login Message
  • Queues
  • Translations Page
  • Configure Emails

Integrations

  • Box Integration in CORE

Sync Review

  • CORE Sync Review

CORE Apps

  • Mobile & iPad v6 App
  • CORE by 5th Kind App
  • Screener Application

Troubleshooting

  • How to clear your cache
  • Troubleshooting Login with Google Authenticator (MFA)

Suspicious Activity

The 5th Kind's CORE system constantly monitors all activity for suspicious behavior, and logs anything it finds. The Suspicious Activity page allows Admins the ability to see all requests made to the system which have been flagged as suspicious.

Filters

Use these filters to view an activity report based on a date range, specific User, or specific security issue.

Date Range

Add a Start and End Date to the Date Range to filter the report by inputs within that range.

User

Use this dropdown to view only inputs from a specific User. You can type in this field to search for names. Click the button to clear it.

Security Issue

Use this dropdown to view only inputs of a specific Security Issue type. You can type in this field to search for Issue types. Click the button to clear it.


Report

View the results of the report here.

userInput

This field shows the request made by the User. Click the icon to expand this and view the full request, as well as the Filter Match from the system, which is the portion of the request that was flagged as a security issue.

userId

The internal ID # of the User who made the request.

idsId

The internal ID # of the issue found by the CORE Intrusion Detection System.

idsDescription

The description of the issue found by the CORE Intrusion Detection System.

tags

The category or categories of the issue.

impact

The severity of the issue, on a scale from 1-7.

message

The message from the Intrusion Detection System regarding the issue found.

type

The type of issue found.

user

The Username of the User who made the request.

eventTime

The time the request was made.

← Production AdminLogin Message →
  • Filters
    • Date Range
    • User
    • Security Issue
  • Report
    • userInput
    • userId
    • idsId
    • idsDescription
    • tags
    • impact
    • message
    • type
    • user
    • eventTime