WorkestraDocs
PlatformSecurity & Privacy

Audit Log

Track and review all significant actions in your workspace.

Audit Log

The Audit Log provides a comprehensive record of all significant actions in your workspace for security monitoring and compliance.

audit log

Screenshot needed � add an annotated image showing this UI

What Is the Audit Log?

The audit log records:

  • Who performed an action
  • What was done
  • When it occurred
  • Where it originated (IP address)
  • How (user agent/device)

Accessing the Audit Log

Navigate to Settings > Data & Privacy > Audit Log.

Audit log access requires Admin or Owner permissions.

Logged Events

9 Event Types

Event TypeDescriptionExample
user.loginUser authentication"john@example.com logged in from 192.168.1.1"
user.logoutSession termination"Session ended for john@example.com"
user.invitedTeam invitation sent"Admin invited jane@example.com as Member"
user.role_changedPermission modification"john@example.com role changed from Member to Admin"
record.createdNew record created"Contact 'Acme Corp' created by john@example.com"
record.updatedRecord modification"Deal 'Enterprise License' updated by jane@example.com"
record.deletedRecord deletion"Ticket #1234 deleted by admin"
settings.changedConfiguration change"AI provider changed from OpenAI to Moonshot"
export.requestedData export initiated"GDPR export requested by owner"

Log Entry Details

Each log entry includes:

FieldDescription
TimestampWhen action occurred (UTC)
ActorWho performed the action (user ID, email)
ActionType of action
TargetWhat was affected (record ID, type)
IP AddressSource IP (partially masked)
User AgentBrowser/device information
ChangesBefore/after values (for updates)
WorkspaceWhich workspace

Filter Options

FilterDescription
Date RangeSpecific time period
UserActions by specific person
Event TypeCategory of action
Resource TypeContacts, deals, tasks, etc.
Resource IDSpecific record

Full-text search across:

  • User emails
  • Record names
  • Action descriptions
  • IP addresses

Retention

Default Retention

Audit logs retained for 2 years.

Exporting Logs

For compliance or analysis:

  1. Apply desired filters
  2. Click Export
  3. Choose format:
    • CSV (spreadsheet)
    • JSON (machine-readable)
    • PDF (human-readable)
  4. Download

Using the Audit Log

Security Monitoring

Regular checks:

  • Failed login attempts
  • Unusual access patterns
  • Privilege escalations
  • After-hours activity

Compliance

Demonstrate:

  • Data access controls
  • Change tracking
  • User accountability
  • Policy enforcement

Troubleshooting

Investigate:

  • Who made a change
  • When data was modified
  • What was deleted
  • How an error occurred

Alerting

Configure Alerts

Get notified for:

EventAlert To
Multiple failed loginsSecurity team
Admin role changesOwner
Bulk deletionsAdmin
Settings changesAdmin
Export requestsCompliance officer

Setting Up

  1. Go to Settings > Data & Privacy > Audit Alerts
  2. Add alert rule:
    • Event type
    • Threshold
    • Recipients
  3. Save

Best Practices

Regular Review

Review audit logs:

  • Weekly: Failed login summary
  • Monthly: Role change report
  • Quarterly: Full access review

Incident Response

If suspicious activity:

  1. Filter logs for timeframe
  2. Identify affected records
  3. Check user access patterns
  4. Take corrective action
  5. Document findings

Compliance

For audits:

  • Export logs quarterly
  • Archive securely
  • Maintain chain of custody
  • Prepare summary reports

Privacy Considerations

Who Can Access

RoleAccess
OwnerFull access
AdminFull access
MemberNo access
ViewerNo access

Data Minimization

Audit logs contain:

  • Necessary identifiers
  • No password data
  • No sensitive content
  • IP addresses partially masked

Next Steps