Events Log

Track every security-relevant action on your WordPress site – logins, plugin changes, post deletions, theme updates, and failed login attempts – with the User Events Log. WP Ghost monitors logged-in user activity 24/7 and records who did what, when, and from which IP address. You can filter by event type, search by keyword, and optionally sync logs to the WP Ghost Cloud Dashboard with email alerts for critical events. This is a Premium feature.

What Is the User Events Log?

What is the WP Ghost User Events Log and how it tracks security-relevant WordPress user activity

The User Events Log records every security-relevant action performed by logged-in users on your WordPress site. It tracks logins and failed login attempts, plugin activations and deactivations, post and page deletions, theme and plugin updates, settings changes, and other dashboard activity that could affect your site’s security. It does not log everyday frontend actions like clicking menus or browsing pages.

Why Track User Activity

Monitoring user activity is essential for your hack prevention strategy, especially on sites with multiple users, freelancers, or client access:

Detect compromised accounts. If an admin account starts making unusual changes – deleting posts, deactivating security plugins, installing unknown themes – the events log shows exactly what happened and when. You can trace the activity to a specific user and IP address.

Track login attempts and patterns. The log records both successful and failed login attempts, including the IP address of each attempt. If someone is targeting your login page, you see it here. Combined with Brute Force Protection, this gives you full visibility into login security.

Audit freelancer and developer activity. When multiple people have dashboard access, the events log creates accountability. You know who activated a plugin, who updated a theme, who modified settings, and when each action occurred.

How to Activate the User Events Log

  1. Go to WP Ghost > Logs > Settings.
  2. Enable Log Users Events.
  3. Optional: enable Enable Cloud Storage for Events Log to sync a copy to your WP Ghost Dashboard (retained for 30 days).
  4. Optional: select specific user roles to monitor under Log User Roles. If you want to monitor all roles, leave this blank (“Nothing Selected”).
  5. Click Save.
WP Ghost User Events Log activation settings with user role selection and cloud storage toggle

User role filtering: You can monitor specific roles only – for example, Subscribers and Contributors but not Administrators. Select the roles you want to track. Multiple roles can be selected. Leaving the dropdown blank monitors all roles.

What Gets Logged

The Events Log records security-relevant dashboard activity for the user roles you selected. Every entry captures what happened and who did it:

Login activity: Successful logins, failed login attempts, login IP addresses, and which IP is targeting your login page.

Content changes: Post and page deletions (who deleted what), attachment uploads and deletions.

Plugin and theme activity: Plugin activations, deactivations, and deletions. Theme and plugin updates. Core file updates.

Settings changes: Any dashboard settings modifications that could impact security.

For every recorded action, WP Ghost shows: the location (IP and country) where the action occurred, the details (path, username, role, plugin/theme name), the user who triggered the action, and the date and time.

Reading the Events Log Report

View events at WP Ghost > Logs > User Events.

WP Ghost User Events Log report showing user actions, login attempts, IP addresses, and timestamps

Use the Filter button to narrow results by event type: login, incorrect password, update plugin, delete plugin, delete post, and more. Use the Search form to find entries by keyword, username, path, or IP address.

WP Ghost Events Log filter showing blocked IPs and event type selection

Search tip: For best results, make sure no filter is applied when using the Search function. Filters and search can conflict if used simultaneously.

Cloud Storage and WP Ghost Dashboard

When Enable Cloud Storage for Events Log is active, WP Ghost syncs events to the WP Ghost Dashboard. Cloud logs are retained for 30 days and then permanently deleted.

The advantage: if your site is compromised and local data is modified or deleted, the cloud copy preserves the activity log for investigation. The Dashboard shows the same details as the local report: website URL, location, action details, and date (UTC).

WP Ghost Cloud Dashboard showing Events Log report with website URL, location, details, and date

Export before deletion: Cloud logs are deleted after 30 days. Use the Export button on the WP Ghost Dashboard to download a copy before expiration.

Email Alerts

Create email alerts for critical events so you can respond within minutes. Alerts are configured in the WP Ghost Dashboard (requires Cloud Storage enabled).

Available alert types:

Login from different IPs – notifies you when the same user logs in from multiple IP addresses (possible account compromise).

Brute Force IP block – notifies you when WP Ghost’s Brute Force Protection blocks an IP. Requires Brute Force Protection to be active.

Too many failed logins – notifies you when a user exceeds 5 failed login attempts. Works independently of Brute Force Protection.

Plugin deleted – notifies you when any plugin is deleted from the site.

Post deleted – notifies you when any post is deleted from the site.

To create an alert: Go to your WP Ghost Dashboard → Email Alerts → click +New → select the website → select the alert type → Submit. Each alert is set up individually.

WP Ghost Dashboard Email Alert creation showing website selection and alert type options

Notification email: By default, alerts go to your WP Ghost account notification email (set in Profile > Settings). You can set a different email for each connected site in Connected Sites → edit icon → custom email. Per-site settings override the default.

To delete an alert, click the delete icon next to it in the Email Alerts panel.

GDPR and Data Storage

When the Events Log is enabled, all events are stored locally in the WordPress database table _hmwp_logs for the retention period you set.

If Cloud Storage is enabled, data is sent to the WP Ghost Dashboard and stored for 30 days. After this period, data is permanently deleted. Collected information includes: action name, post ID, post type, username, post name, plugin name, and attachment name. Each piece of information is saved only when a user triggers an action. The data is not shared with third parties and not used for marketing.

A notification in the WP Ghost sidebar informs users when Cloud Storage is active, ensuring transparency about data transmission.

Frequently Asked Questions

Is this a Premium feature?

Yes. The User Events Log is available in WP Ghost Premium. The free version includes path security, firewall, and brute force protection but not event logging.

Is this the same as the Security Threats Log?

No. The User Events Log tracks internal activity – what your logged-in users do on the dashboard. The Security Threats Log tracks external threats – malicious requests from bots and attackers. They’re complementary: threats show what’s attacking you; events show what’s happening inside.

Does this log frontend user activity?

No. The Events Log only tracks security-relevant dashboard actions: logins, plugin changes, post deletions, settings modifications, and similar administrative events. It does not log everyday frontend browsing like clicking menus, viewing pages, or adding items to a WooCommerce cart.

Does this work with WooCommerce?

Yes. The Events Log tracks WooCommerce admin actions (product changes, order modifications, plugin updates) the same way it tracks regular WordPress dashboard activity. WP Ghost is fully compatible with WooCommerce.

Does WP Ghost modify WordPress core files?

No. Event logging uses WP Ghost’s own database table and WordPress hooks. No core files are modified. Disabling the feature stops logging instantly.

Use the Events Log alongside these security features: