Skip to main content

Complete Activity Tracking

Real-time security and activity monitoring for your organization. Track authentication events, data access, and system activities with complete audit trails. Image

Real-Time Streaming

Live audit events streamed to admin users via WebSocket

90-Day Retention

Audit logs automatically retained for 90 days

CSV Export

Export logs for any time frame for compliance and analysis

Detailed Event View

Click any row for full event details including raw JSON

Event Types

EventDescription
User loginSuccessful sign-in with method and IP
Failed loginIncorrect credentials or blocked attempt
MFA verificationMulti-factor authentication challenge
SSO authenticationSingle sign-on via identity provider
LogoutUser-initiated session end

Time Range

Last 24h, 7 days, 30 days, 90 days, or a custom date range

Event Filters

Filter by event type, severity, or resource type

User Search

Find all activity by a specific user

Severity Levels

LevelMeaning
InfoNormal operations — logins, reads, routine actions
WarningUnusual but non-critical — failed logins, permission edge cases
ErrorSomething went wrong — failed operations, system errors
CriticalRequires attention — access breaches, data integrity issues

Event Details

Click any log row to expand the full event record:
FieldWhat it shows
TimestampExact time of the event
Event TypeCategory and specific action
UserWho performed the action
ResourceWhat was affected (source, file, QA pair)
Request InfoIP address, user agent
Full JSONComplete raw event data

Export

Export audit logs as CSV for compliance documentation, security audits, or external analysis.
Exports are rate-limited to 10 per 24 hours per organization. Each export includes all event types for the selected time range.
Exported files preserve all event details while automatically redacting sensitive data (tokens, keys, passwords).

Data Security

Sensitive data protection

Audit logs automatically sanitize sensitive information before storage. JWT tokens, API keys, and passwords are redacted. Personal data is protected in compliance with GDPR and FADP.
Logs are stored in your organization’s own isolated database — the same security controls that protect your other data. All storage is in European data centers.
Every request is tagged with a UUID for end-to-end tracing. Connect related events across operations for debugging and compliance investigations.

Access Control

Audit logs are admin-only. Regular members cannot view or export audit logs. All admin activity is itself logged — there are no untracked actions.

Compliance Use Cases

Export logs for external security auditors to demonstrate access controls and monitoring capabilities.
Use detailed logs to investigate security incidents, track unauthorized access attempts, and understand the scope of any issues.
Generate reports on user activity for internal reviews, identifying usage patterns and potential policy violations.
Maintain evidence of security controls for GDPR, SOC 2, and other compliance frameworks.

Security Settings

Configure MFA, SSO, and password policies

Roles & Permissions

Manage roles and access levels

Team Management

Invite, remove, and manage members