Skip to content

Audit Log

The Audit Log records every administrative action taken in the platform, providing a comprehensive trail for accountability, compliance, and troubleshooting. Every configuration change — from user creation to carrier updates — is captured with full before-and-after detail.

Audit Log page showing timestamped entries with user, action, target, and change details

All administrative actions across the platform are automatically recorded:

CategoryActions Tracked
UsersCreate, edit, delete, role changes, 2FA resets, bulk provisioning
CampaignsConfiguration changes, activation, deactivation, pacing adjustments
SettingsSystem settings modifications (branding, email, storage, security)
TelephonyCarrier, DID, phone extension, and trunk group changes
AIProvider settings changes, model selection, API key updates
Security2FA resets, password changes, session revocations, policy changes
Bulk OperationsMass lead updates, imports, deduplication merges
InboundQueue configuration, IVR menu edits, music-on-hold changes

Each entry captures the full context of the action:

  • Timestamp — exact date and time when the action occurred
  • User — who performed the action (username and display name)
  • Action — what was done (create, update, delete)
  • Target — the entity that was affected (e.g., “User: john.smith” or “Carrier: trunk-provider-1”)
  • Old Value — the previous state before the change
  • New Value — the new state after the change
  • IP Address — the network address where the action originated

Filter audit entries to find exactly what you need:

  • Date range — narrow results to a specific time window
  • User — see all actions by a particular administrator
  • Action type — filter by create, update, or delete operations
  • Target entity — search for changes to a specific record or entity type
  • Keyword search — free-text search across all audit fields

A separate dedicated log tracks all authentication events:

  • User, timestamp, and IP address for every login and logout
  • Login method — password only, password + TOTP, or password + email 2FA
  • Session duration — how long each session lasted
  • Failed login attempts — track brute-force attempts or credential issues