Skip to main content

Audit logging

Providing visibility and traceability for meeting compliance requirements

Updated over a week ago

What is it?

This feature provides users with a dedicated audit log that records key user and system events across the platform. Admins can now see who performed an action, what was changed, when it happened and from which IP, providing transparency and secure collaboration for compliance-driven environments.

What actions are logged?

User: Identity and account

Action

User account created

create

Basic info changed (name, email, timezone)

update

User role changed

update

Target access/permissions changed

update

Email confirmation completed

update

User: Authentication & MFA

Two-factor authentication enabled

update

Two-factor authentication disabled

update

MFA backup codes regenerated

update

Password changed

update

Password reset requested

update

User: SSO

SSO provider linked to account

update

SSO provider unlinked from account

update

Access Tokens

API access token created

create

API access token revoked

delete

Where can I find it?

You can find it under Settings > Audit

What does it look like?

What plan is it available on?

It's available to admin users on Cloud, Pro and Enterprise.

What is the retention period?

For users on the Cloud and Pro account, we retain logs for the last 90 days; for those on the Enterprise plan we retains logs for one year.

Did this answer your question?