Skip to main content

Guestline Rezlynx: Trusted Browsers - Manage browsers and audit logs

You can regularly review and manage access to Trusted Browsers to ensure site security, in a few simple steps.

Xanthe Jackson avatar
Written by Xanthe Jackson
Updated over 2 weeks ago

The Trusted Browser feature provides a practical solution to a common challenge in hospitality: maintaining robust security whilst accommodating operational realities. Rather than requiring staff to use mobile phones for authentication codes or install software on shared computers, Trusted Browsers treat approved browsers as a second authentication factor.

Find out more about Trusted Browser in our overview and setup article.

⚠️ Important: Only Admin users with user management rights and MFA enabled can manage Trusted Browsers. If you don’t have these permissions, please contact your Admin User. Guestline support cannot complete this process on your behalf.


Managing Trusted Browsers

To ensure a secure and smooth experience with Trusted Browsers, we recommend that your Admin regularly review pending requests, as well as approved requests, to ensure access to the system is correct.

Security recommendations

Regular reviews

  • Audit trusted browsers monthly.

  • Remove access for unused browsers.

  • Update browser names for clarity.

Browser maintenance

  • Keep browsers updated with the latest security patches.

  • Clear old/unused browser approvals.

  • Document which PCs have trusted browsers.

Staff changes

  • When employees leave, review and reject their browsers.

  • During role changes, verify appropriate access levels.


Access Trusted Browsers

To access Trusted Browsers, follow the steps below:

  1. Within Guestline Rezlynx PMS navigate to System, Tools , then Admin Panel.

    📌 Note: If you do not have access, please contact your Admin user on site.

  2. Select Trusted Browsers in the left-hand menu.


Search and Filter

Use the search and filter options to review Trusted Browsers, including:

  • Pending requests requiring approval or rejection.

  • Approved requests should be regularly reviewed the device still needs access, and is known to site.

  • Monitor usage patterns and IP addresses.


Edit Trusted Browser names

You can edit Trusted Browser names to make it easier to review and monitor for both trusted and rejected browsers. When naming browsers, remember to use clear and consistent names that indicate both the location and browser type, such as "Reception Desk 1 - Chrome," "Manager Office - Firefox," or "Housekeeping Station 2 - Edge." This approach makes it immediately obvious which profile belongs to which workstation and what browser it uses.

To edit Trusted Browser names, follow the steps below:

  1. Click the pencil icon next to the browser name.

  2. Enter a descriptive name – for example, Front Desk PC – Edge.

  3. Click Save Changes.


When to reject or disable a Trust Browser

You may want to reject a browser based on the following reasons:

  • When employees leave - Review and reject their browsers to remove their access.

  • During staff role changes - Verify and remove access if no longer appropriate for their new position.

  • Old or unused browsers - Remove access for browsers that are no longer in use to reduce security risks.

  • Suspicious activity - If you notice unusual IP addresses or usage patterns during your monitoring.

  • Decommissioned workstations - When PCs or devices are taken out of service.

  • Lost or stolen devices - If a device with a trusted browser goes missing.

  • Unclear or unverified browsers - If you can't identify which device/location a browser belongs to.


How to reject or disable a Trusted Browser

To reject or disable a Trusted Browser at any time, follow the steps below:

  1. Find the browser in the list and select it.

  2. Select Manage Access.

  3. Select Reject to block this browser from future log in attempts.

⚠️ Important: When a browser is rejected, this will not automatically log users out. They can still operate for as long as their session is active. The next time they try to log in, they'll be rejected.


How to run use the Audit report

⚠️ Important: Only Admin users with user management rights and MFA enabled can manage Trusted Browsers. If you don’t have these permissions, please contact your Admin User. Guestline support cannot complete this process on your behalf. The audit logs provide an overview of all actions related to the Trusted Browsers feature.

To review the audit logs, follow the steps below:

  1. Within Guestline Rezlynx PMS navigate to System, Tools, then Admin Panel.

    📌 Note : If you do not have access, please contact your Admin user on site.

  2. Select Trusted Browsers in the left-hand menu.

  3. Select Audit Logs tab.

  4. To refine the report output, set one of more of the onscreen filters including:

    • Browser ID: Enter a partial or a full Browser ID

    • Browser Name: Enter a partial or a full Browser name

    • User: Enter a full or partial username.

    • Event Type: Select from the drop-down menu to refine the search by action.

  5. Click Search to view the output on screen. The report cannot currently be exported.

The output on screen is shown in chronological order. The event icons offer a quick reference for the type of action performed.

📌 Note: The log filters do not save, and will return to their default settings once you have navigated away from this page.

Did this answer your question?