Security Audit Logs
Security Audit Logs
Learn how to use security audit logs to monitor, track, and investigate user activities, security events, and system changes to maintain security compliance and detect potential threats.
Overview
The Security Audit Logs feature provides super administrators with comprehensive visibility into security-related events and user activities across the Shifts platform. These logs record authentication events, security setting changes, suspicious activities, and other critical security information. This article explains how to access, interpret, and use security audit logs for monitoring, investigation, and compliance purposes.
Accessing Security Audit Logs
To access the security audit logs:
- Log in with super administrator credentials
- Navigate to Super Admin > Security Administration > Audit Logs
- Alternatively, from the System Admin dashboard, select System Logs > Security Logs
- The main security logs view displays recent security events by default
Understanding Security Event Types
The system tracks various security-related events:
Authentication Events
- Login Success: Successful user login attempts
- Login Failure: Failed login attempts, including reason (wrong password, account locked, etc.)
- Logout: User logout events
- Session Management: Session creation, expiration, and revocation
- Two-Factor Authentication: 2FA setup, verification, and disabling events
User Management Events
- Password Changes: When users change their passwords
- Password Resets: Password reset requests and completions
- Profile Updates: Changes to security-related profile fields
- Account Lockouts: When accounts are locked due to failed attempts
- User Creation and Deactivation: New user creation or account status changes
System Configuration Events
- Security Setting Changes: Modifications to security configuration
- IP Restriction Changes: Updates to allowed IP ranges
- Two-Factor Requirement Changes: Modifications to 2FA policies
- Permission Changes: Updates to security-related permissions
- API Token Creation/Revocation: Management of API access tokens
Suspicious Activity Events
- Unusual Location Access: Logins from new or unexpected locations
- IP Restriction Violations: Access attempts from disallowed IPs
- Unexpected Device Usage: Logins from new or unregistered devices
- Rapid Access Pattern Changes: Unusual patterns of system access
Navigating the Audit Logs Interface
The audit logs interface provides several tools for efficient log analysis:
Main Log View
The central log display shows:
- Timestamp of each event
- User who performed the action (or was the subject of a system action)
- Event type with color-coded severity indicators
- Business context (which tenant was affected)
- IP address
- Brief description of the event
Filtering Options
Narrow down logs using these filters:
- Date Range: Select specific time periods to investigate
- Event Type: Filter by specific security events
- User: Focus on activities from a particular user
- Business: View events related to a specific business
- IP Address: Filter activities from specific IP addresses
- Portal: Filter by system_admin or customer portal
Detailed Log View
Click on any log entry to see comprehensive details:
- Complete user information
- Detailed event information
- Browser and device data
- Full JSON metadata
- Related events
- Context of the action (controller, action, URL)
Using Audit Logs for Security Monitoring
Real-time Monitoring
Monitor current security status:
- Access the security dashboard
- View real-time metrics on:
- Active sessions
- Recent login attempts
- Failed authentication trends
- Two-factor adoption rates
- Suspicious activity alerts
Security Investigation
Investigate specific security incidents:
- Use filters to focus on the relevant timeframe and event types
- Trace user activities leading up to and following an incident
- Examine IP addresses and geographic locations
- Check device information for unfamiliar patterns
- Look for correlation between different security events
User Activity Tracking
Follow specific user activities:
- Filter logs by the target user
- View their login history, including times and locations
- Track security setting changes they’ve made
- Monitor for unusual behavior patterns
- Verify appropriate access patterns
Exporting and Reporting
Generate reports from security audit data:
Export Options
- From the audit logs view, click Export
- Select your preferred format:
- CSV for spreadsheet analysis
- JSON for programmatic processing
- PDF for formal reporting
- Choose the date range and filters for the export
- Download the exported file
Scheduled Reports
Set up regular security reports:
- Navigate to Reports > Scheduled Reports
- Create a new report focused on security metrics
- Configure the schedule (daily, weekly, monthly)
- Set delivery options (email recipients, format)
- Activate the scheduled report
Compliance Monitoring
Use audit logs for regulatory compliance:
Compliance Dashboard
- Access the Compliance section of the security dashboard
- View compliance metrics related to:
- Two-factor authentication adoption
- Password policy enforcement
- Access control implementation
- Suspicious activity detection
Compliance Reports
Generate specific compliance documentation:
- Use pre-configured compliance report templates
- Customize reports to match specific regulatory requirements
- Include comprehensive audit trail information
- Document security control effectiveness
Retention and Archiving
Understand how audit data is managed:
Data Retention
- Security audit logs are retained according to your organization’s retention policy
- Default retention is designed to support compliance requirements
- High-priority security events may have extended retention periods
Archiving Options
For long-term storage of audit data:
- Navigate to System Administration > Data Management
- Access the Archive section
- Set up archiving rules for audit logs
- Configure storage locations for archived data
Best Practices
For optimal security monitoring:
- Regular Review: Schedule time to review security logs at least weekly
- Baseline Understanding: Establish what normal activity looks like in your environment
- Investigative Process: Develop a standard procedure for security event investigation
- Alert Configuration: Set up notifications for critical security events
- Documentation: Maintain records of significant security findings
- Correlation Analysis: Look for patterns across different event types
- Proactive Monitoring: Don’t wait for incidents—regularly scan for anomalies
Related Resources
This article should be updated when:
- New security event types are added to logging
- Changes to the audit log interface
- New filtering or export capabilities
- Updates to retention policies
- Additional security analytics features
- Changes to how security events are categorized