Data, logging and investigations

Data, logging and investigations

Q: What logs and reporting does GuestConnect provide?
A: GuestConnect provides:

§  Per‑visitor access history: who was issued which key, for what period, and at which site.

§  Timestamps aligned with your visitor management system (check‑in and checkout).

§  Integration with network‑side logs (e.g. Aruba Central, Meraki) so security teams can:

§  Correlate visitor identity with IP/MAC activity

§  Investigate incidents, especially in sensitive environments like schools or public venues

GuestConnect’s email logs also provide a secondary trail of credential delivery.

 

Q: How does this help in environments like schools or public facilities?

A: In those environments, it’s critical to know:

§  Who a device belonged to,

§  When it was on the network, and

§  What network segment it used.

GuestConnect, combined with your wireless logs, provides that linkage. If there’s suspicious or illegal activity, you have defensible data to support internal investigation and, if required, law‑enforcement inquiries.


    • Related Articles

    • Hosting, architecture and operations

      Q: How is our data separated from other customers? A: Each customer receives a dedicated GuestConnect instance, including: § Separate application instance and data store § Independent scaling to match your guest volumes § Shared, centrally maintained ...
    • Visitor compliance and behavioural change

      Q: How does GuestConnect help us enforce visitor sign‑in policies? A: GuestConnect tightens the link between sign‑in and Wi‑Fi: § If visitors don’t sign in, they don’t get Wi‑Fi – there’s no alternate shared code to “just give them”. § Staff learn ...