Audit Logs
Track all activity in your organization for compliance and security.
Audit logs require a Business plan or higher.
What’s Logged
User Actions
- Sign in / sign out
- Profile changes
- Password changes
Document Actions
- Create, view, edit, delete
- Share and unshare
- Download and export
Organization Actions
- Member invitations
- Role changes
- Team management
- Settings changes
Security Events
- Failed login attempts
- Permission changes
- API key usage
- SSO events
Viewing Audit Logs
Go to Organization → Audit Logs
Log Entry Details
Each entry shows:
- Timestamp: When it occurred (UTC)
- Actor: Who performed the action
- Action: What was done
- Resource: What was affected
- IP Address: Source location
- Details: Additional context
Filtering Logs
By Action Type
- All actions
- Document actions
- User actions
- Admin actions
- Security events
By User
Search for specific user activity.
By Date Range
- Last 24 hours
- Last 7 days
- Last 30 days
- Custom range
By Resource
Filter by specific documents, teams, or other resources.
Search
Full-text search across:
- User names
- Actions
- Resource names
- IP addresses
Export Logs
Manual Export
- Apply desired filters
- Click Export
- Choose format (CSV, JSON)
- Download file
Scheduled Export
Automatically export logs:
- Click Export → Schedule
- Set frequency
- Choose destination
- Enable
SIEM Integration
For Enterprise customers:
- Stream logs to your SIEM
- Splunk, Datadog, etc.
- Real-time event streaming
Log Retention
| Plan | Retention |
|---|---|
| Business | 90 days |
| Enterprise | 1 year (configurable) |
Export logs before the retention period expires if you need longer storage.
Security Monitoring
Suspicious Activity
Look for:
- Failed login patterns
- Unusual access times
- Bulk downloads
- Permission escalation
Alerts (Enterprise)
Set up alerts for specific events:
- Go to Audit Logs → Alerts
- Create alert rule
- Define trigger conditions
- Set notification method
Next Steps
- Analytics - View usage analytics and insights
- Security - Configure SSO, SCIM, and security settings
- Roles & Permissions - Understand access control
Last updated on