View the Audit Log
How to access and filter the audit log to track user actions, data changes, and security events across your workspace.
How to access and filter the audit log to track user actions, data changes, and security events across your workspace.
This guide explains how to use the audit log to track all user actions and system events in your workspace. The audit log provides a complete record for security investigations and compliance audits.
/settings.Screenshot: The audit log page showing a filterable table with columns for timestamp, user, action, entity, and details.
Each entry records:
Use the filter controls to narrow results:
Animation: Filtering the audit log by user "John Smith" and action "delete" to see all records John has deleted.
Look for:
Click Export to download the filtered audit log as a CSV file. Use this for:
Tip: Set a quarterly reminder to review the audit log for unusual patterns. Regular reviews are a SOC 2 best practice.
Note: Audit log entries cannot be modified or deleted. They provide a tamper-proof record of all workspace activity.
Did this answer your question?