An audit log (also called an audit trail) is a chronological record of events, actions, or changes that happen in a system, application, or process. It’s essentially a detailed logbook that shows who did what, when, where, and how.
Audit logs are used to track activity for security, compliance, troubleshooting, and accountability.
Key Characteristics of an Audit Log:
Timestamped – each event has a date and time.
User identity – records which user, account, or process performed the action.
Action details – describes what was done (e.g., login, file change, configuration update).
System context – may include IP addresses, device info, or location.
Immutable – ideally cannot be altered or deleted, to ensure trustworthiness.
Why is the Audit Logs important:
Security: Detect unauthorized access or suspicious activity.
Forensics: Reconstruct events after a breach or error.
Accountability: Prove that proper procedures were followed.

Here you can select a date range and or a specific Individual that processed a change or just a specific area or field in the application that was changed, it will show you what was changed and from what to what.
