Audit Logs
Audit logs provide a comprehensive record of all actions taken in your Crew workspace. Use them for security monitoring, compliance requirements, and troubleshooting.Full audit log access is available on Professional and Enterprise plans.
What’s Logged
Authentication Events
| Event | Description |
|---|---|
auth.login.success | Successful login |
auth.login.failure | Failed login attempt |
auth.logout | User logged out |
auth.mfa.enabled | MFA enabled for user |
auth.mfa.disabled | MFA disabled for user |
auth.password.changed | Password changed |
auth.password.reset | Password reset requested |
auth.session.expired | Session timed out |
User Management
| Event | Description |
|---|---|
user.created | New user added |
user.updated | User details changed |
user.deleted | User removed |
user.role.changed | User role modified |
user.invited | Invitation sent |
user.invitation.accepted | User accepted invite |
API Access
| Event | Description |
|---|---|
api_key.created | New API key created |
api_key.revoked | API key deleted |
api_key.used | API key used (sampled) |
api.request | API request made (sampled) |
Configuration Changes
| Event | Description |
|---|---|
agent.created | Agent created |
agent.updated | Agent configuration changed |
agent.deleted | Agent deleted |
pathway.created | Pathway created |
pathway.updated | Pathway modified |
pathway.deleted | Pathway deleted |
webhook.created | Webhook configured |
webhook.updated | Webhook modified |
webhook.deleted | Webhook removed |
settings.updated | Workspace settings changed |
Data Access
| Event | Description |
|---|---|
call.viewed | Call details accessed |
transcript.viewed | Transcript accessed |
recording.accessed | Recording downloaded/played |
export.created | Data export requested |
export.downloaded | Export downloaded |
Telephony Events
| Event | Description |
|---|---|
call.initiated | Outbound call placed |
call.answered | Call connected |
call.ended | Call terminated |
call.transferred | Call transferred |
sms.sent | SMS sent |
Log Format
Structure
Fields
| Field | Description |
|---|---|
id | Unique log entry ID |
timestamp | When the event occurred (ISO 8601) |
event_type | Type of event |
actor | Who performed the action |
resource | What was affected |
action | The action taken |
changes | Before/after values (if applicable) |
metadata | Additional context |
Accessing Logs
Dashboard
View logs in the dashboard:- Go to Settings → Audit Logs
- Filter by date, event type, or actor
- Search for specific entries
- Export for analysis
API
Query logs programmatically:Filtering
Pagination
Exporting Logs
CSV Export
JSON Export
SIEM Integration
Forward logs to your SIEM:- Splunk
- Datadog
- Sumo Logic
- Custom webhook
Retention
Default Retention
| Plan | Retention Period |
|---|---|
| Starter | 30 days |
| Professional | 90 days |
| Enterprise | 365 days (configurable) |
Extended Retention
Enterprise customers can configure:Alerting
Security Alerts
Configure alerts for suspicious activity:Alert Channels
| Channel | Configuration |
|---|---|
| Recipient addresses | |
| Webhook | Endpoint URL |
| Slack | Webhook URL |
| PagerDuty | Integration key |
Use Cases
Security Monitoring
Track suspicious authentication patterns:Compliance Auditing
Document access to sensitive data:Change Tracking
Review configuration changes:User Activity
Investigate user actions:Log Integrity
Immutability
Audit logs are immutable:- Cannot be modified after creation
- Cannot be deleted (except by retention policy)
- Attempts to tamper are logged
Verification
Enterprise customers can request:- Cryptographic log verification
- Third-party audit attestation
- Log integrity reports
Best Practices
Review logs regularly
Review logs regularly
Schedule weekly or monthly log reviews for security.
Set up alerts
Set up alerts
Configure alerts for critical security events.
Export for long-term storage
Export for long-term storage
Export logs before retention expiration if needed.
Integrate with SIEM
Integrate with SIEM
Forward logs to your security monitoring platform.
Document access patterns
Document access patterns
Use logs to demonstrate compliance.
Next Steps
- Security Overview — Security architecture
- SSO — Identity management
- Customer Responsibilities — Your role