Understanding Audit Logs
Audit logs provide a complete record of all actions taken within your Scalelite Manager Pro account. Use them for:
- Security monitoring: Track login attempts and unauthorized access
- Change tracking: See who modified configurations and when
- Compliance: Maintain records for security audits
- Troubleshooting: Identify recent changes that may have caused issues
Viewing Audit Logs
Navigate to Audit Logs from the sidebar. You'll see a chronological list of all account activity:
Audit Logs
| User | Action | Resource | IP Address | Time |
|---|---|---|---|---|
|
JD
John Davis
|
Updated |
Server: bbb-node-1
Changed
load_multiplier from 1.0 to 1.5
|
192.168.1.100 | Today, 2:34 PM |
|
SM
Sarah Miller
|
Created |
Alert Rule: High CPU Usage
Threshold: CPU > 80%, Severity: Warning
|
10.0.0.55 | Today, 11:22 AM |
|
JD
John Davis
|
Security |
MFA Enabled
Two-factor authentication activated
|
192.168.1.100 | Today, 10:15 AM |
|
MJ
Mike Johnson
|
Login |
Portal Access
Successful login via password
|
203.45.67.89 | Today, 9:45 AM |
|
|
Deleted |
API Key: old-integration
Auto-expired after 365 days
|
— | Yesterday, 12:00 AM |
|
JD
John Davis
|
Logout |
Session Ended
Manual logout
|
192.168.1.100 | Nov 27, 5:30 PM |
Action Types
Audit logs categorize actions into several types:
- Login/Logout: User authentication events
- Create: New resources added (alert rules, API keys, team members)
- Update: Configuration changes to existing resources
- Delete: Resources removed from the system
- Security: MFA changes, password updates, security settings
Filtering and Searching
Use the filter dropdowns to narrow down log entries:
- Action Type: Filter by login, configuration changes, security events, etc.
- User: View actions by a specific team member
- Time Range: Focus on recent activity or investigate historical events
Exporting Audit Logs
Click the "Export" button to download audit logs as CSV for offline analysis or compliance reporting. Exports include the current filter selection.
Security Best Practices
- Review logs weekly: Check for unusual activity patterns
- Investigate failed logins: Multiple failed attempts may indicate brute force attacks
- Monitor after changes: After configuration changes, verify expected behavior
- Archive for compliance: Export and archive logs as required by your security policy