Audit Workspace Security Logs

Prev Next

The Security Logs feature allows administrators to track configuration changes across the workspace. This helps identify which users performed actions, when they occurred, and what values were modified.

The feature is available on the Enterprise plan and requires the Can Audit permission.

Each log entry includes:

  • The setting that was changed

  • The time of the change

  • The actor (user or system) who made the change

  • The values before and after the change

View security logs

To access the Security Logs panel:

  1. Open the kebab menu (⋮) and select Audit > Security logs. If no filters are applied, the most recent records are shown first.

  2. Click on a log entry to expand and view more details about the change.

  3. Use the Date range fields to select a start and end date.

  4. Use the Setting dropdown to filter logs by a specific setting, or leave it on All Settings.

  5. Click Apply filters to update the results or Clear filters to reset them.

  6. At the bottom of the page, use the pagination controls to move through pages and select how many records to display per page (25, 50, or 100).