# Audit Log

## Overview

The Audit Log records and displays a chronological sequence of authentication-related actions taken by users. It serves as a reliable source of truth for:

* Monitoring account activity
* Troubleshooting suspicious behavior
* Supporting compliance audits
* Enhancing user accountability

You can access the Audit Log from the **Account > Audit Log** section.

Each log entry includes:

* **Email address**
* **Action**
* **Category**
* **IP address**
* **Date**
* **Time** (timezone depends on your account settings)

***

## Logged Actions

All authentication-related actions currently captured in Loadium’s Audit Log are listed below:

| `user register`                   | A new user account was created                                          |
| --------------------------------- | ----------------------------------------------------------------------- |
| `user activation`                 | The user's account was activated                                        |
| `user email activation`           | The user re-sent the activation email                                   |
| `user change-password`            | The user changed their account password                                 |
| `user forgot-password`            | A password reset request was initiated by the user                      |
| `user-update`                     | The user updated their account details (e.g., name, email, preferences) |
| `login`                           | The user successfully logged into the platform                          |
| `logout`                          | The user logged out from the platform                                   |
| `sub-users invitation create`     | An admin created a new sub-user invitation                              |
| `resend Invited User Mail`        | A sub-user invitation email was re-sent                                 |
| `delete Invited User`             | A pending invited sub-user was deleted before activation                |
| `sub-users invitation activation` | A sub-user accepted their invitation and activated their account        |
| `sub-user register`               | A new sub-user account was registered                                   |
| `sub-user update`                 | A sub-user's details or permissions were updated                        |
| `sub-user-delete`                 | A sub-user account was deleted                                          |
| `google login`                    | The user logged in using Google authentication                          |
| `microsoft login`                 | The user logged in using Microsoft authentication                       |
| `sub-user microsoft login`        | A sub-user logged in using Microsoft authentication                     |
| `amazon register`                 | Amazon login integration was initiated                                  |
| `amazon activation`               | Amazon login integration was successfully completed                     |
| `amazon user info`                | User details were retrieved from Amazon during authentication           |
| `company delete`                  | A company account was deleted from the platform                         |

***

### **Use Cases**

* **Security Review:** Quickly identify failed login attempts or access from unusual IPs.
* **Compliance Audits:** Demonstrate access control measures to meet regulatory requirements (e.g., ISO 27001).
* **Incident Response:** Trace suspicious user behavior to determine potential compromise or misuse.

***

### **Retention Policy**

Audit logs are stored securely and retained for **90 days**. Extended retention options may be available for enterprise customers.

***

### **Export & Filtering**

* **Filter Options:** By date range
* **Export:** Audit logs can be exported as CSV for internal reporting or compliance use
