Skip to main content

Audit Log

The Audit Log provides a complete record of all organization activity. Use it for security monitoring, compliance, and incident investigation.

Access via Organization → Audit Log.

Event Types

Authentication Events

EventDescription
user.loginUser logged in
user.logoutUser logged out
user.login_failedFailed login attempt
user.mfa_enabledMFA enabled
user.password_changedPassword changed
sso.loginSSO authentication

Member Events

EventDescription
member.invitedInvitation sent
member.joinedAccepted invitation
member.role_changedRole updated
member.removedRemoved from org
member.suspendedAccount suspended

Agent Events

EventDescription
agent.createdNew agent registered
agent.updatedAgent configuration changed
agent.deletedAgent removed
agent.blockedAgent blocked
agent.unblockedAgent unblocked
agent.trust_tier_changedTrust tier changed

Policy Events

EventDescription
policy.createdNew policy created
policy.updatedPolicy modified
policy.deletedPolicy removed
policy.enabledPolicy activated
policy.disabledPolicy deactivated

Guardrail Events

EventDescription
guardrail.createdNew guardrail created
guardrail.updatedGuardrail modified
guardrail.deletedGuardrail removed

Behavioral Rule Events

EventDescription
behavioral_rule.createdNew rule created
behavioral_rule.updatedRule modified
behavioral_rule.deletedRule removed
behavioral_rule.triggeredRule matched a pattern

Approval Events

EventDescription
approval.requestedHITL request created
approval.approvedRequest approved
approval.rejectedRequest rejected
approval.expiredRequest timed out
approval.escalatedRequest escalated

API Key Events

EventDescription
api_key.createdNew key created
api_key.deletedKey revoked
api_key.usedKey used for authentication

Settings Events

EventDescription
settings.updatedOrganization settings changed
integration.configuredIntegration added/updated
webhook.configuredWebhook configured

Log Entry Structure

Each entry contains:

{
"id": "log_abc123",
"timestamp": "2024-01-15T09:14:32.001Z",
"event": "approval.approved",
"actor": {
"id": "usr_xyz789",
"email": "john@company.com",
"type": "user"
},
"target": {
"type": "approval",
"id": "apr_def456"
},
"metadata": {
"agent_id": "agt_ghi789",
"operation": "EXTERNAL_API_CALL",
"comment": "Verified by security team"
},
"ip_address": "192.168.1.1",
"user_agent": "Mozilla/5.0..."
}

Filtering

By Date Range

  • Last 24 hours
  • Last 7 days
  • Last 30 days
  • Custom range

By Event Type

Select specific event categories:

  • Authentication
  • Members
  • Agents
  • Policies
  • Approvals
  • Settings

By Actor

Filter by who performed the action:

  • Specific user
  • System (automated)
  • API (programmatic)

By Target

Filter by what was affected:

  • Specific agent
  • Specific team
  • Specific policy

Full-text search across:

  • Event descriptions
  • Actor emails
  • Target names
  • Metadata
Search: "external api" agent:customer-support

Export

Manual Export

  1. Apply desired filters
  2. Click Export
  3. Select format (CSV or JSON)
  4. Download file

Scheduled Export (Enterprise)

Enterprise feature:

  1. Go to Organization → Audit Log
  2. Click Configure Export
  3. Set schedule (daily, weekly, monthly)
  4. Configure destination (S3, GCS, SFTP)
  5. Enable encryption (optional)

Retention

PlanRetention
Free30 days
Team90 days
Enterprise1 year+ (configurable)

Compliance Use Cases

Use the audit log to support audits and investigations:

  • Review access and configuration changes
  • Confirm approval decisions and escalations
  • Provide evidence timelines during incident response

Alerts

Configure alerts for specific events:

  1. Go to Organization → Settings → Alerts
  2. Click Create Alert
  3. Select trigger event (e.g., user.login_failed count > 5)
  4. Configure notification channel
  5. Enable alert

Example alerts:

  • Multiple failed logins
  • Agent blocked
  • Policy deleted
  • API key created

Next Steps

  1. Compliance - Use audit trails and attestation evidence for auditors
  2. View Attestation - Get cryptographic proof of agent behavior