What is it?
This feature provides users with a dedicated audit log that records key user and system events across the platform. Admins can now see who performed an action, what was changed, when it happened and from which IP, providing transparency and secure collaboration for compliance-driven environments.
What actions are logged?
User: Identity and account | Action |
User account created | create |
Basic info changed (name, email, timezone) | update |
User role changed | update |
Target access/permissions changed | update |
Email confirmation completed | update |
User: Authentication & MFA |
|
Two-factor authentication enabled | update |
Two-factor authentication disabled | update |
MFA backup codes regenerated | update |
Password changed | update |
Password reset requested | update |
User: SSO |
|
SSO provider linked to account | update |
SSO provider unlinked from account | update |
Access Tokens |
|
API access token created | create |
API access token revoked | delete |
Where can I find it?
You can find it under Settings > Audit
What does it look like?
What plan is it available on?
It's available to admin users on Cloud, Pro and Enterprise.
What is the retention period?
For users on the Cloud and Pro account, we retain logs for the last 90 days; for those on the Enterprise plan we retains logs for one year.

