Audit Logs

Audit Logs

Track and monitor all user activities and system events in VerifyMe

The Audit Logs screen provides comprehensive tracking and monitoring of all user activities and system events within VerifyMe. This powerful tool enables administrators to maintain security, ensure compliance, monitor user behavior, and troubleshoot issues by providing a detailed chronological record of every action performed in the system.

Access: SuperAdmin and Organization Admin only

Audit Logs

Audit Logs Table

A comprehensive table displaying all logged activities with detailed information about each event.

Table Columns

1. Time

  • Description: Exact date and time when the action occurred
  • Format: "MMM DD, YYYY HH:MM AM/PM"
  • Example: "Dec 29, 2025 1:12 PM"
  • Timezone: Displays in system or user's configured timezone
  • Sort Order: Most recent events typically displayed first (default)

2. Entity

The system component or feature where the action occurred.

Available Entities:

  • Auth: Login attempts, authentication events, logout activities, session management
  • Document Type: Document type creation, modifications, deletion, field configuration changes
  • Project: Project creation, updates, deletion, configuration changes, name changes
  • QC Screen: File assignments, status updates, verification activities, document submissions
  • User: User account creation, profile updates, deletion, role changes, password resets

3. Action

The specific operation performed.

Available Actions:

  • CREATE: New records added (user, project, document type, etc.)
  • UPDATE: Modifications to existing records
  • DELETE: Records removed from system
  • SUBMITTED: Document verification completed
  • RESET PASSWORD: Password reset operations
  • RESTORE: Deleted items restored
  • MARKED FOR REVIEW: Files flagged for additional review
  • ADD: Comments, fields, or items added
  • ASSIGNED: Files or users assigned to projects
  • UNASSIGNED: Assignments removed
  • TIMEOUT: Inactivity timeouts occurred
  • OTHER: Login, logout, and miscellaneous actions

4. Performed By

  • Description: The user who performed the action
  • Display: Username, email address, or system identifier
  • Examples: "arjun", "rf super admin", "[email protected]", "SYSTEM"

5. Organization

  • Description: The organization associated with the action
  • Display: Organization name with icon
  • Example: "United Health Group"

6. Details

Additional context and specific information about the action in natural language format.

Example Details:

  • "arjun has logged in."
  • "arjun has created a new project name Smart Policy"
  • "arjun has changed project name from SMART POLICY to LIFESECURE."
  • "rf super admin has created a new user,Arjun,for the role Org admin in the following organization:United Health Group."

Common Use Cases

Security Monitoring

Monitoring Login Activities:

  1. Set Entity filter to "Auth"
  2. Set Date Time filter to appropriate range (e.g., "Past 1d" or "Past 7d")
  3. Review login patterns and activities
  4. Look for multiple failed login attempts, after-hours access, unusual login patterns

User Activity Tracking

Monitoring Specific User:

  1. Find specific user in "Performed By" column
  2. Set appropriate date range
  3. Review all actions by that user
  4. Track productivity and compliance

Project Management

Tracking Project Lifecycle:

  1. Filter by Entity: "Project"
  2. Set date range to project timeline
  3. Review all project-related activities
  4. Monitor creation, updates, and completion

Compliance Auditing

Regulatory Compliance Review:

  1. Set filter to required compliance period (e.g., "Past 90d")
  2. Review all CREATE, UPDATE, DELETE actions
  3. Document change management compliance
  4. Export logs for reporting if needed

Troubleshooting

Investigating Issues:

  1. Set filter to time when issue occurred
  2. Search for related entity or user
  3. Review sequence of events
  4. Identify root cause from details

Best Practices

Regular Monitoring

  • Daily Reviews: Check authentication logs, review critical actions, monitor for unusual patterns
  • Weekly Reviews: Comprehensive review of all entities, analyze user activity patterns
  • Monthly Reviews: Full audit for compliance reporting, long-term trend analysis

Access Control

FeatureSuperAdminOrganization AdminQC LeadQC Analyst
View Audit Logs

Important: Only SuperAdmins and Organization Admins have access to the Audit Logs screen. This ensures that sensitive system activity information is restricted to authorized personnel with system-wide oversight responsibilities.