The Audit Trail logs the activity within your organization. You can use the Audit Trail to monitor security events.
To view the Audit Trail, go to Manage > Audit Trail.
A log of system events and activities
An audit trail provides a chronological list of system events and user activities. Organization owners can use audit trails to monitor the operations that their users perform and to trace events.
With the audit trail, you can investigate how a series of events might have led to an event. Examples of what you can investigate include the following:
- How a test was deleted
- How a member lost access to a project,
- How a subscription or billing settings were altered.
If you notice suspicious activity, you can use audit logs to rule out the possibility that something or someone gained unauthorized access to your organization. You can scan the audit trail for abnormalities and even check whether the IP addresses match what you have registered for your users.
- To view results within a specified time frame, use the period filter (highlighted in yellow).
- To change how results are sorted, use the columns (highlighted in orange).
|Created||Date and time the event took place|
|Triggered by||Source of the event|
|Event||Brief summary of the event|
|IP Address||The users IP address|