Follow
Understanding Audit Logs

As a system administrator, you can track user-triggered changes in the system using the following audit logs:

NOTE Information about user-triggered changes is not available prior to the 2018.2 Release.

User Log

The system generates a User Log entry when a user performs any of the following actions:

  • Creates a user
  • Deletes a user
  • Changes a user's access level, company, team, or group
  • Activates a user
  • Deactivates a user

The following table shows the fields that are recorded in the User Log:

Date & Time Log Type User Name Action  Object Details IP Address
When the action occurred Name of the audit log

Name of the user who performed the action

Action performed by the user: Change, Create, Delete, Activate, Deactivate Name of the user affected as a result of the action Additional details about the action. Mouse over the text to read the full message. The user's IP address at the time of the action. The IP address is not available for some system actions.

User.png

Access Level Log

The system generates an Access Level Log entry when a user performs any of the following actions:

  • Creates an access level
  • Deletes an access level
  • Changes an access level
    • Modifies the license type
    • Changes permissions to Projects, Tasks, Issues, Portfolios, Programs, Reports, Documents, Users, or Templates
      NOTE The system does not record any permission changes to Financial Data or within the following access types: View and Edit.
      For example, if a user changes the Planner access type from View to Edit, the system will not display information contained in the Fine-tune your settings drop-down menu.

The following table shows the fields that are recorded in the Access Level Log:

Date & Time Log Type User Name Action  Object Details IP Address
When the action occurred Name of the audit log

Name of the user who performed the action

Action performed by the user: Change, Create, Delete Name of the access level affected as a result of the action Additional details about the action. Mouse over the text to read the full message. The user's IP address at the time of the action.

Access_Level.png

Group Log

The system generates a Group Log entry when a user performs any of the following actions:

  • Creates a group
  • Deletes a group
  • Changes a group
    • Adds or removes users
    • Adds or removes subgroups

The following table shows the fields that are recorded in the Group Log:

Date & Time Log Type User Name Action  Object Details IP Address
When the action occurred Name of the audit log

Name of the user who performed the action

Action performed by the user: Change, Create, Delete Name of the grop affected as a result of the action Additional details about the action. Mouse over the text to read the full message. The user's IP address at the time of the action. The IP address is not available for some system actions.

Group.png

Login Attempt Log

The system generates a Login Attempt Log entry when a user performs any of the following actions:

  • A user successfully logs in
  • A user logs out
  • A user fails to log in

NOTE Login attempt logs do not record when a system administrator uses the Log In As feature. This activity is tracked in the ____ log.

The following table shows the fields that are recorded in the Log In Attempt audit log:

Date & Time Log Type User Name Action  Object Details IP Address
When the action occurred Name of the audit log

Name of the user who performed the action. On a failed login, this column displays "System."

Action performed by the user: Log In, Log Out, Failed Log In This column is blank for Login Attempt logs. Additional details about the action. Mouse over the text to read the full message. The user's IP address at the time of the action. The IP address is not available for some system actions.

 Login_Attempt.png

This article last updated on 2018-10-16 20:16:35 UTC