Skip to Content
Back to Security & API
Security & API Security

Reviewing Audit Logs

Track all account activity and changes

Understanding Audit Logs

Audit logs provide a complete record of all actions taken within your Scalelite Manager Pro account. Use them for:

  • Security monitoring: Track login attempts and unauthorized access
  • Change tracking: See who modified configurations and when
  • Compliance: Maintain records for security audits
  • Troubleshooting: Identify recent changes that may have caused issues

Viewing Audit Logs

Navigate to Audit Logs from the sidebar. You'll see a chronological list of all account activity:

Audit Logs
User Action Resource IP Address Time
JD
John Davis
Updated Server: bbb-node-1
Changed load_multiplier from 1.0 to 1.5
192.168.1.100 Today, 2:34 PM
SM
Sarah Miller
Created Alert Rule: High CPU Usage
Threshold: CPU > 80%, Severity: Warning
10.0.0.55 Today, 11:22 AM
JD
John Davis
Security MFA Enabled
Two-factor authentication activated
192.168.1.100 Today, 10:15 AM
MJ
Mike Johnson
Portal Access
Successful login via password
203.45.67.89 Today, 9:45 AM
System
Deleted API Key: old-integration
Auto-expired after 365 days
Yesterday, 12:00 AM
JD
John Davis
Logout Session Ended
Manual logout
192.168.1.100 Nov 27, 5:30 PM

Action Types

Audit logs categorize actions into several types:

  • Login/Logout: User authentication events
  • Create: New resources added (alert rules, API keys, team members)
  • Update: Configuration changes to existing resources
  • Delete: Resources removed from the system
  • Security: MFA changes, password updates, security settings

Filtering and Searching

Use the filter dropdowns to narrow down log entries:

  • Action Type: Filter by login, configuration changes, security events, etc.
  • User: View actions by a specific team member
  • Time Range: Focus on recent activity or investigate historical events

Exporting Audit Logs

Click the "Export" button to download audit logs as CSV for offline analysis or compliance reporting. Exports include the current filter selection.

Security Best Practices

  • Review logs weekly: Check for unusual activity patterns
  • Investigate failed logins: Multiple failed attempts may indicate brute force attacks
  • Monitor after changes: After configuration changes, verify expected behavior
  • Archive for compliance: Export and archive logs as required by your security policy

Was this article helpful?

Still need help? Contact support

Search across meetings, recordings, and participants
Press ESC to close