The Audit Log is a useful way to track recent events in your platform. The types of events range from creating user data, tracking when people log in, and much more.
To view the audit log, your permission group must include the permission: settings.audit_log.view
Part 1: Access the audit log
Go to Settings > All Settings > Audit log.
Review the five data columns shown:
Date – The timestamp when the action occurred.
Event – The type of action recorded (e.g. Login Succeeded, Person Created).
Data – The detailed payload of the event. This is your main source of insight and can be exported as JSON.
Actioning user – The user who performed the action.
Bulk data – Indicates if the change was made using the Bulk Data Tool.
When you select an event, the Data field shows what was created, changed or deleted.
Part 2: Filter and search for audit events
Use the Search bar to find all events involving a specific employee.
Enter their Person ID or Display Name to return both actions they performed and changes affecting them.
Use the Filter options to refine your search:
Set a date range to isolate activity within a specific period.
Select one or more event types (e.g. Job End Date Finalised, Pulse Created).
Combine multiple filters to narrow your results further.
Filtering helps you quickly find actions such as supervisor updates, changes to form designs, or login patterns.
Part 3: Export and analyse audit data
Click on any event’s Data field to view the full JSON payload.
To export the record:
Copy the JSON content and paste it into a JSON-to-CSV converter to generate a table-like format for reporting.
Save or download the converted file to share with relevant stakeholders or attach to an investigation report.
Once exported, you can review the full detail of each change in spreadsheet format, including old and new values.
Tenant Configuration Updated
Pulse Created
Job End Date Finalized
Additional information
You can use the audit log to trace changes from unexpected user behaviour, such as accidental data edits or misused permissions.
Common use cases include:
Verifying who changed a supervisor or job end date.
Checking login history for a specific user.
Investigating unknown changes to system settings or templates.