Complete Activity Tracking for Your Organization
Real-time security and activity monitoring for your organization. Track authentication events, data access, and system activities with complete audit trails.
Key Features
Real-Time Streaming
WebSocket streaming of audit events to admin users
6-Month Retention
Audit logs retained for 6 months (RAG operations: 3 months)
Export Functionality
Export logs for any time frame (CSV format)
Expandable Details
Click any log row to view complete information
Event Types
Audit logs capture four categories of events:Authentication Events
- User logins and logouts
- Failed login attempts
- MFA enrollment and verification
- SSO authentication
Data Access Events
- Create, read, update, delete operations
- File uploads and downloads
- QA pair modifications
- Response generation
Security Events
- Permission changes
- Access denials
- Suspicious activity detection
- Password changes
System Events
- Background task completions
- Export operations
- Integration activities
- System errors
Filtering & Search
Time Range Filters
| Filter | Description |
|---|---|
| Last 24 hours | Recent activity |
| Last 7 days | Weekly view |
| Last 30 days | Monthly view |
| Last 90 days | Quarterly view |
| Custom range | Select specific dates |
Event Filters
Filter logs by:- Event type (authentication, data access, security, system)
- Severity level (info, warning, error, critical)
- Resource type (source, file, QA pair, user)
User Search
Filter logs by specific user:- Dedicated user search field
- Search by user ID or email
- Track individual user activity
Expandable Log Details
Click any log row to open a detailed view showing:- Timestamp: Exact time of the event
- Event Type: Category and action
- User: Who performed the action
- Resource Details: What was affected
- Request Info: IP address, user agent
- Full JSON: Complete event data
Export Capabilities
Export audit logs for compliance documentation and external analysis.Export Features
- Export any time frame
- CSV format for spreadsheet analysis
- Includes all event details
- Preserves sensitive data redaction
Export Limits
- Rate-limited exports per organization
- Covers all event types in a single export
Data Security
Sensitive Data Protection
Audit logs automatically sanitize sensitive information:- JWT tokens redacted
- API keys masked
- Passwords never logged
- Personal data protected
Storage Location
- Logs stored in your organization’s isolated database
- Same security controls as your other data
- European data centers
Request Correlation
- UUID-based request tracing
- Connect related events across systems
- Useful for debugging and compliance
Admin-Only Access
Audit logs are only accessible to organization administrators:- Admins can view all organization activity
- Regular members cannot access audit logs
- Activity is logged even for admin users
Compliance Use Cases
Security audits
Security audits
Export logs for external security auditors to demonstrate access controls and monitoring capabilities.
Incident investigation
Incident investigation
Use detailed logs to investigate security incidents, track unauthorized access attempts, and understand the scope of any issues.
User activity reports
User activity reports
Generate reports on user activity for internal reviews, identifying usage patterns and potential policy violations.
Compliance documentation
Compliance documentation
Maintain evidence of security controls for GDPR, SOC 2, and other compliance frameworks.