Book Image

Moodle Security

Book Image

Moodle Security

Overview of this book

Table of Contents (17 chapters)
Moodle Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface

Activity monitoring using Moodle tools


Moodle offers several options when it comes to analyzing and monitoring user activity inside the platform. Monitoring is not real-time but it is close enough for most regular needs.

Moodle log

The word log has several meanings. The one we are interested in is defined as a regular or systematic record of incidents or observations. In computer terminology log is a place where some program stores a list of events that are intended for later potential review by an administrator. Log can be generated and stored in various places and formats. The most simple and common format is a plain text file. Every system should (and usually does) have some logging facility. That is also the case with Moodle. Since Moodle is a heavily database oriented application it was somewhat logical to implement its log inside the database. Log is stored in <table prefix>log table. In the version of Moodle used for writing this text we have over 290 locations where logging...