Protect Web (Dashboard)

System Application Audit Logs

This user guide provides instructions for navigating and using the System Audit Log page. The audit log tracks system activities, allowing users to monitor non-security actions, troubleshoot issues, and ensure compliance. This guide covers how to filter audit logs, export data, and view detailed log information.

Last updated on 01 Dec, 2025

Overview

The System Audit Log page displays a table of audit log entries, each representing a system event. You can filter logs, export them for analysis, and view detailed information about specific events. The page is designed to help administrators and authorised users track activities such as settings updates, alert retrievals, and audit log access.

Filtering Audit Logs

The audit log interface provides several filters to narrow down the list of displayed events, making it easier to find specific activities.

Available Filters

  • From/To: Specify a date and time range to view events within a particular period.

  • User Name: Filter by the username associated with the event (e.g., Hugo@metropolis.com).

  • Source IP: Filter by the IP address from which the event originated.

  • Source Bearer: Filter by the access method, such as Web Browser.

  • Event Status: Filter by the status of the event (e.g., success or failure, if applicable).

  • Event Level: Filter by the audit log level (Basic, Detailed, or Maximum), as configured in the System Settings.

Applying Filters

  1. Navigate to the System Audit Log page.

  2. Locate the filter fields at the top of the page.

  3. Enter or select the desired criteria in the relevant filter fields.

  4. Click Apply (or similar) to update the audit log table with the filtered results.

  5. To clear all filters, click Reset.

Note

  • Filters are cumulative, meaning multiple filters can be applied simultaneously to refine results.

  • The Reset button clears all filter inputs, restoring the full list of audit logs.

Exporting Audit Logs

You can export audit log data for external analysis or record-keeping in PDF (limited to 10,000 events) or CSV format (limited to 50,000 events).

Export Options

  • Export PDF: Generates a PDF file containing the filtered audit log entries.

  • Export CSV: Generates a CSV file with the filtered audit log entries, suitable for use in spreadsheets or other analysis tools.

Exporting Logs

  1. Apply any desired filters to display the relevant audit logs.

  2. Click Export PDF or Export CSV at the top of the page.

  3. Save the generated file to your device when prompted.

  4. Open the file to review the exported data.

Note

  • Exports include all events within the filter, even if not currently visible on the page.

  • Ensure your device has sufficient storage and appropriate software to view PDF or CSV files.

Viewing Audit Log Entries

The audit log table displays key information about each event, with the option to view additional details for individual entries.

Table Columns

  • Outcome: The result of the action (e.g., success or failure, if applicable).

  • ID: Unique identifier for the audit log entry (e.g., 166409).

  • Timestamp: Date and time the event occurred (e.g., 15:52:46, 16/05/2025).

  • User Name: The user who performed the action (e.g., Hugo@metropolis.com).

  • Source IP: The IP address from which the action was performed.

  • Source Bearer: The method of access (e.g., Web Browser).

  • Event Actions: A brief description of the action (e.g., Got Alert - AY00226 or Retrieved a list of 12 Settings).

  • Event Level: The audit log level (Basic, Detailed, or Maximum).

Viewing Audit Log Details

  1. Locate the desired audit log entry in the table.

  2. Click on the entry to load that event in the Audit Log Details view.

  3. Review the detailed information, which includes all of the above details, with the addition of:

    • Browser Data: Details about the browser used, if applicable (e.g., Mozilla/5.0...).

    • Data: Additional metadata related to the event, such as the number of items affected (e.g., 32 items). You can click on the data and get the complete details request if required.

  4. Close the details view to return to the main audit log table.

Note

  • The Event Level indicates the granularity of the logged action, as set in the System Settings (Basic, Detailed, or Maximum).

Best Practices

  • Regular Monitoring: Periodically review audit logs to detect unauthorized actions or system issues.

  • Use Filters Effectively: Apply filters to focus on specific users, time periods, or event types for efficient analysis.

  • Secure Exports: Store exported PDF or CSV files securely, as they may contain sensitive information.

  • Check Event Levels: Ensure the audit log level in System Settings is set appropriately to capture the desired level of detail without overloading storage.

 

 

Did you find this article helpful?
Previous

Notification Center & User Profile Settings

Next