1. Home
  2. Docs
  3. PFIM
  4. Reporting
  5. General
  6. Audit Log

Audit Log

An audit log (also called an audit trail) is a chronological record of events, actions, or changes that happen in a system, application, or process. It’s essentially a detailed logbook that shows who did what, when, where, and how.

Audit logs are used to track activity for security, compliance, troubleshooting, and accountability.

Key Characteristics of an Audit Log:

Timestamped – each event has a date and time.

User identity – records which user, account, or process performed the action.

Action details – describes what was done (e.g., login, file change, configuration update).

System context – may include IP addresses, device info, or location.

Immutable – ideally cannot be altered or deleted, to ensure trustworthiness.

Why is the Audit Logs important:

Security: Detect unauthorized access or suspicious activity.

Forensics: Reconstruct events after a breach or error.

Accountability: Prove that proper procedures were followed.

Here you can select a date range and or a specific Individual that processed a change or just a specific area or field in the application that was changed, it will show you what was changed and from what to what.

How can we help?