This article is for school leadership and wellbeing staff.
The Timeline allows you to generate reports detailing all traffic to and from a student’s devices. It shows a student’s last 10,000 connections over any 24 hours, and whether each connection was allowed or blocked. You can access a user’s Timeline from the User’s Dashboard. As needed, you can also export the Timeline report as a comma separated text file.
Accessing the Timeline from the User's Dashboard
The most common way to access the User’s Dashboard is from the Active Users report. Other reports, like Red Flags, can link you to a User’s Dashboard.
From the Statistics > Active Users menu:
- Verify the Date Range you want to use.
- On the Active Users page, type any part of the Username or Name in the Search and press the enter/return key.
- Select Username to open the User’s Dashboard.
- Select User Timeline.
Custom ranges are limited to a continuous period of no more than 24 hours. If you need more than 10,000 rows of data, you will need to set a shorter date range and repeat the search for the next segment of dates.
Timeline Report
A User’s Timeline report will display the most recent website events for the past hour. We recommend reviewing six hours at a time for faster report results. You can select up to 24 hours of timeline activity at a time.
Column |
Type of Data |
---|---|
A. Date/Time |
The year, month, day and hour, minute, second the connection was started. |
B. Machine Name |
The name your IT support set for Windows and macOS computers. Only available when your IT support has opted to sync the additional identity information with School Manager. |
C. Verdict |
The label Allowed or Blocked for each website the user’s device attempted to connect to. |
D. Website |
Web address or network address of the connection. Connections to IT infrastructure, like printers or your school’s servers, may be identified by numbers or codes. |
E. Type |
Website categories to help you identify. Type is blank for connections to IT infrastructure, like printers. Use the Type to identify patterns of activity. |
F. Upload |
The amount of data sent from the user’s computer to the website or device (for example, an assignment uploaded to a website). |
G. Download |
The amount of information the user's computer viewed or saved (for example, all of the text and images on a web page). |
H. Connection Details (arrow) |
Your IT support may use these details to identify the device and what was running when the activity was recorded. |
Tip
When data is sent (Upload) or saved/viewed (Download), Gigabyte (GB) is the largest, followed by a megabyte (MB), then a kilobyte (KB), and byte (B) is the smallest.
Use a search engine to investigate web addresses you do not recognize. Type “whois” followed by a space and the web address. For example, search for “whois Linewize”.
Investigating Timeline Data
A. Time period
Select up to 24 hours. Choose from presets of the Last 1 Hour to 24 Hours or Custom Range from a calendar.
B. Filter by
Select to filter the results by
- Verdict: All - Both Blocked and Allowed activity
- Verdict: Blocked - Websites the user was prevented from accessing
- Verdict: Allowed - Websites the user was able to access
C. Search
Type any part of the Time (24-hour format), Machine Name (if macOS and Windows names are available), Website or Type (category name).
D. Export Report
Download the current activity in a CSV text file. Open the file in a spreadsheet program.
Connection Details
The Connection Details are close to the raw information to help your IT support identify what was running when the activity was recorded.
You may find a few of the following Details can be used to identify activity.
You may find the following Details to be of use to you. Type the Detail label into the Search box or scroll down the Connection details list to find information.
Label |
Usage |
---|---|
agent |
Discover if Connect is running in the browser, as a “chrome-extension”, running on “windows” or macOS “darwin” |
hostname |
The optional Machine Name your IT support sets on Windows or macOS computers. |
httpHost |
The website address |
http_request_uris |
Additional “web path” after the web address. Popular websites often include keywords in the web address (like “watch”, “download” or “live”) that may give you a hint to the purpose of the website. |
tag |
Subcategory or topic associated with this website, if available. |
Comments
0 commentsPlease sign in to leave a comment.