Overview
The System Audit Log page displays a table of audit log entries, each representing a system event. You can filter logs, export them for analysis, and view detailed information about specific events. The page is designed to help administrators and authorised users track activities such as settings updates, alert retrievals, and audit log access.
Filtering Audit Logs
The audit log interface provides several filters to narrow down the list of displayed events, making it easier to find specific activities.
Available Filters
From/To: Specify a date and time range to view events within a particular period.
User Name: Filter by the username associated with the event (e.g., Hugo@metropolis.com).
Source IP: Filter by the IP address from which the event originated.
Source Bearer: Filter by the access method, such as Web Browser.
Event Status: Filter by the status of the event (e.g., success or failure, if applicable).
Event Level: Filter by the audit log level (Basic, Detailed, or Maximum), as configured in the System Settings.
Applying Filters
Navigate to the System Audit Log page.
Locate the filter fields at the top of the page.
Enter or select the desired criteria in the relevant filter fields.
Click Apply (or similar) to update the audit log table with the filtered results.
To clear all filters, click Reset.
Note
Filters are cumulative, meaning multiple filters can be applied simultaneously to refine results.
The Reset button clears all filter inputs, restoring the full list of audit logs.
Exporting Audit Logs
You can export audit log data for external analysis or record-keeping in PDF (limited to 10,000 events) or CSV format (limited to 50,000 events).
Export Options
Export PDF: Generates a PDF file containing the filtered audit log entries.
Export CSV: Generates a CSV file with the filtered audit log entries, suitable for use in spreadsheets or other analysis tools.
Exporting Logs
Apply any desired filters to display the relevant audit logs.
Click Export PDF or Export CSV at the top of the page.
Save the generated file to your device when prompted.
Open the file to review the exported data.
Note
Exports include all events within the filter, even if not currently visible on the page.
Ensure your device has sufficient storage and appropriate software to view PDF or CSV files.
Viewing Audit Log Entries
The audit log table displays key information about each event, with the option to view additional details for individual entries.
Table Columns
Outcome: The result of the action (e.g., success or failure, if applicable).
ID: Unique identifier for the audit log entry (e.g., 166409).
Timestamp: Date and time the event occurred (e.g., 15:52:46, 16/05/2025).
User Name: The user who performed the action (e.g., Hugo@metropolis.com).
Source IP: The IP address from which the action was performed.
Source Bearer: The method of access (e.g., Web Browser).
Event Actions: A brief description of the action (e.g., Got Alert - AY00226 or Retrieved a list of 12 Settings).
Event Level: The audit log level (Basic, Detailed, or Maximum).
Viewing Audit Log Details
Locate the desired audit log entry in the table.
Click on the entry to load that event in the Audit Log Details view.
Review the detailed information, which includes all of the above details, with the addition of:
Browser Data: Details about the browser used, if applicable (e.g., Mozilla/5.0...).
Data: Additional metadata related to the event, such as the number of items affected (e.g., 32 items). You can click on the data and get the complete details request if required.
Close the details view to return to the main audit log table.
Note
The Event Level indicates the granularity of the logged action, as set in the System Settings (Basic, Detailed, or Maximum).
Best Practices
Regular Monitoring: Periodically review audit logs to detect unauthorized actions or system issues.
Use Filters Effectively: Apply filters to focus on specific users, time periods, or event types for efficient analysis.
Secure Exports: Store exported PDF or CSV files securely, as they may contain sensitive information.
Check Event Levels: Ensure the audit log level in System Settings is set appropriately to capture the desired level of detail without overloading storage.
