All Docs
FeaturesAgentOS WorkUpdated March 12, 2026

Introducing Security Audit and Monitoring — v1.0.71

Introducing Security Audit and Monitoring — v1.0.71

Version 1.0.71 ships a comprehensive security monitoring layer built directly into the platform. This release is aimed at security teams, compliance officers, and platform administrators who need continuous visibility into threats, anomalies, and incident activity across their tenants.


What's New

Threat Detection

The platform now monitors activity in real time and matches it against a library of known threat patterns. When a threat is identified it is classified by severity:

SeverityDescription
LowInformational; no immediate action required
MediumReview recommended within 24 hours
HighReview recommended promptly
CriticalImmediate action required; automated response may trigger

All detected threats appear in the Security section of the admin console under Threat Events.


Anomaly Analysis

Anomaly analysis builds a rolling baseline of expected behaviour for users and system processes within each tenant. Deviations from that baseline are scored and surfaced automatically — no manual rule configuration needed to get started.

What is baselined:

  • Login times and locations
  • API call volumes and patterns
  • Data access and export activity
  • Privilege escalation attempts

Anomaly scores and supporting context are visible in the Anomaly Explorer view, allowing administrators to investigate and mark events as expected or suspicious.


Automated Security Incident Response

Playbooks let you define the automatic actions the platform takes when a threat or anomaly crosses a threshold you choose. This reduces response time without requiring human intervention for well-understood scenarios.

Supported automated actions:

  • Suspend the affected user account
  • Terminate all active sessions for a user
  • Send an alert notification to designated administrators
  • Capture a full audit log snapshot associated with the incident

Playbooks are created and managed in Settings → Security → Response Playbooks.


Comprehensive Security Reporting

Administrators can generate on-demand reports covering:

  • Threat event summaries (count, severity distribution, resolution status)
  • Anomaly trend lines over configurable date ranges
  • Incident timelines showing detection, response, and resolution steps

Reports can be exported as PDF (suitable for audit submissions) or CSV (suitable for further analysis). Report scope is limited to the requesting user's tenant.


Compliance Dashboards

The new compliance dashboard provides a high-level view of your organisation's security posture. Key metrics are mapped to control categories commonly required during audits, giving compliance officers a single place to assess readiness and identify gaps before a formal review.

The dashboard is accessible to users with the Security Admin or Compliance Officer role.


Getting Started

  1. Navigate to Security in the admin console.
  2. Review any pre-populated threat events or anomalies detected since your last login.
  3. Visit Settings → Security → Response Playbooks to configure automated response actions.
  4. Open the Compliance tab to review your current posture metrics.
  5. Use Reports → Security to generate and download your first security report.

Permissions

FeatureRequired Role
View Threat EventsSecurity Admin, Compliance Officer, Super Admin
Manage Response PlaybooksSecurity Admin, Super Admin
View Anomaly ExplorerSecurity Admin, Super Admin
Export Security ReportsSecurity Admin, Compliance Officer, Super Admin
View Compliance DashboardSecurity Admin, Compliance Officer, Super Admin

Released in v1.0.71. For questions, contact your platform administrator or refer to the Changelog for full version history.