Events logs
Objective¶
The Event Log in Netsocs Synergy is the central nervous system of the platform.
It offers a complete, interactive, and auditable log of all signals, actions, and state changes of objects and users.
Unlike a passive log, the Event Log functions as a dynamic management environment, where operators can:
- Visualize what is happening in real time.
- Act directly on each event.
- Transform data into operational intelligence.
In this section you will learn:
- The main capabilities of the Event Log.
- How the Recognitions system works.
- How data is converted into operational intelligence.
Main Capabilities¶
The Event Log is a tool designed to monitor, manage, and analyze security and control operations.
| Feature | Description |
|---|---|
| Forensic Traceability | Records and preserves every event with detailed metadata, without retention limits. |
| Online Management | Allows executing actions directly on events from the list. |
| Workflows | Uses a fully customizable Recognitions system. |
| Data Analysis | Feeds analytics dashboards with key metrics and indicators (KPIs). |
| Advanced Filtering | Powerful search options by date, event type, object, and more. |
Absolute Traceability¶
Every event entering Synergy is recorded immutably.
The system saves not only the description and time, but also a complete set of properties and metadata:
- Event ID: Unique identifier.
- Source Object: Device, sensor, or entity that generated it.
- Event Codes: Standardized codes (e.g.,
E570,R570). - Responsible User: If generated by a human action, the operator is recorded.
INFO
Event Log storage has no practical limits. This ensures the availability of a complete history for audits, incident investigations, and trend analysis.
Interactive Event Management¶
The Event Log allows interacting directly with records.
Each event includes a contextual menu with immediate actions, which vary depending on the object type.
Common actions include:
- Bypass: Temporarily ignore a sensor or zone.
- Restore Alarm: Return a sensor to surveillance state.
- Activate Test Mode: Enable diagnostics on the device.
- Access Technical Information: Open detailed object properties.
👉 This transforms the Event Log into a command and control tool, reducing response times and errors.
Workflows with Recognitions¶
The Event Log uses the Recognitions system to standardize event management.
These states are fully configurable by the organization and adapt to SOPs (Standard Operating Procedures).
Examples of customizable states:
- False Alarm
- In Progress
- Escalated to Supervisor
- Technical Visit Required
TIP
Each state can include a name, icon, and color of its own, facilitating a clear visual overview of the event queue.
From Data to Operational Intelligence¶
The Event Log doesn't just store events, it transforms them into strategic information.
All recorded data feeds the Synergy analytics engine to generate KPIs.
Examples of derived metrics:
- Average Response Time: Operator's average response time.
- Average Handling Time: Total event management time.
- False Alarm Rate: Percentage of events classified as false alarms.
👉 These metrics allow managers to:
- Measure team performance.
- Identify bottlenecks.
- Detect patterns or anomalies.
- Make decisions based on objective real-time data.
✅ With this approach, the Netsocs Synergy Event Log transcends the traditional log concept and becomes a platform for control, management, and real-time operations analysis.