What We Log
User Activity
| Event | Details Captured |
|---|---|
| Logins | User, timestamp, IP address, method |
| Queries | User, question asked, data sources used |
| Actions | User, action type, target, result |
| Settings changes | User, what changed, old/new values |
Administrative Events
| Event | Details Captured |
|---|---|
| Member changes | Who was added/removed, by whom |
| Integration setup | What was connected, by whom |
| Permission changes | What changed, who made the change |
| Billing events | Plan changes, payment events |
System Events
| Event | Details Captured |
|---|---|
| API calls | Endpoint, parameters, response |
| Integration queries | Service, query, data returned |
| Errors | Error type, context, resolution |
Accessing Audit Logs
Admin Access
Organization admins can view logs:- Go to Settings > Security > Audit Log
- Filter by user, event type, or date range
- Export for analysis or compliance
Log Format
Retention
Standard Retention
- Activity logs: 90 days
- Security events: 1 year
- Administrative actions: 1 year
Enterprise Retention
Extended retention available:- Custom retention periods
- Long-term archival
- Compliance-specific requirements
Security Monitoring
Automated Alerts
We monitor for:- Unusual access patterns: Anomalous login behavior
- Failed authentications: Multiple failed attempts
- Privilege escalation: Unexpected permission changes
- Data access anomalies: Unusual query patterns
Response Procedures
When alerts trigger:- Automated notification to security team
- Investigation within defined SLA
- Customer notification if warranted
- Remediation and documentation
Compliance Support
Audit logs can help support various compliance frameworks:SOC 2 (In Progress)
- Evidence of access control effectiveness
- Proof of security monitoring
- Change management documentation
GDPR
- Data access tracking
- Processing activity records
- Right to access support
CCPA
- Personal data access logging
- Deletion request tracking
Using Logs for Security
Regular Reviews
We recommend:Weekly: Review user activity
Weekly: Review user activity
Check for unusual patterns or access
Monthly: Review admin actions
Monthly: Review admin actions
Audit permission and configuration changes
Quarterly: Full audit review
Quarterly: Full audit review
Comprehensive review for compliance
Investigation Support
For security investigations:- Use date range filters to narrow scope
- Filter by user to trace specific activity
- Export logs for external analysis
- Contact security@adapt.com for support
API Access
Enterprise customers can access logs programmatically:Questions?
For audit log questions:- Email: security@adapt.com
- Enterprise: Contact your account manager