AirmailerairmailerDocs

OverviewDashboardActivity FeedAudit Log

Sign In
Airmailerairmailer
  1. Docs
  2. Activity & Monitoring
  3. Audit Log

Audit Log

The Audit Log provides a complete, tamper-evident record of all significant events in your Airmailer account. Use it for compliance, security review, and detailed investigation of past activities.

Purpose of the Audit Log

The Audit Log serves several critical functions:

  • Compliance: Meet regulatory requirements for record-keeping
  • Security: Track access and changes to your account
  • Investigation: Understand exactly what happened and when
  • Accountability: Know who did what in your account

Accessing the Audit Log

Navigate to Activity in the sidebar, then select the Audit tab.

Audit Log Contents

Event Types Logged

| Category | Events Tracked | |----------|---------------| | Emails | Received, sent, processed, failed | | Documents | Uploaded, modified, deleted | | Settings | Brand changes, agent configuration | | Team | Members added, removed, role changes | | Access | Logins, session activity |

Event Information

Each audit entry includes:

  • Timestamp: Precise time of the event
  • Event Type: What happened
  • Actor: Who or what triggered the event
  • Details: Specific information about the event
  • Outcome: Success or failure

Log Entry Format

┌─────────────────────────────────────────────────────────┐
│ Email Processed                                         │
│ January 15, 2026 at 10:45:23 AM UTC                    │
│                                                         │
│ Actor: System (AI Agent)                               │
│ Details: Processed inbound email from                  │
│          customer@example.com                          │
│ Outcome: Success                                        │
│ Conversation ID: conv_abc123                           │
└─────────────────────────────────────────────────────────┘

Using the Audit Log

Compliance Review

For regulatory compliance:

  1. Export logs for the required period
  2. Verify all required events are captured
  3. Store exports according to requirements

Security Investigation

If you suspect unauthorized access:

  1. Review login events
  2. Check setting changes
  3. Look for unusual patterns
  4. Note IP addresses and timestamps

Issue Investigation

When troubleshooting:

  1. Find the event in question
  2. Review surrounding events
  3. Check for related failures
  4. Trace the sequence of events

Searching the Log

By Date Range

Specify start and end dates to narrow your search.

By Event Type

Filter to specific event categories:

  • Email events
  • Document events
  • Team events
  • Settings events

By Outcome

Filter to:

  • All events
  • Successful events only
  • Failed events only

Audit Log vs Activity Feed

| Audit Log | Activity Feed | |-----------|---------------| | All event types | Email events focus | | Compliance-oriented | Monitoring-oriented | | Detailed records | Quick overview | | Long retention | Shorter retention | | Formal format | User-friendly format |

Data Retention

Audit logs are retained according to your plan:

| Plan | Retention Period | |------|-----------------| | Starter | 30 days | | Growth | 90 days | | Enterprise | Custom (up to 7 years) |

For longer retention, export logs regularly.

Exporting Audit Logs

Export Options

  • CSV format for spreadsheet analysis
  • JSON format for system integration
  • PDF format for formal records

Export Process

  1. Select date range
  2. Choose event types to include
  3. Select format
  4. Download file

Best Practices

  • Export monthly at minimum
  • Store exports securely
  • Verify export completeness
  • Maintain backup copies

Audit Log for Compliance

GDPR Compliance

Track:

  • Access to personal data
  • Data processing events
  • Consent-related activities

SOC 2 Compliance

Document:

  • Access controls
  • Change management
  • Security events

Industry-Specific

Configure logging for:

  • HIPAA (healthcare)
  • PCI DSS (payments)
  • Other regulations

Security Considerations

Log Integrity

Audit logs are:

  • Immutable (cannot be modified)
  • Cryptographically verified
  • Protected from tampering

Access Control

Audit log access is:

  • Limited to authorized users
  • Logged (meta-audit)
  • Role-based

Privacy

Logs may contain:

  • Email addresses (customer data)
  • User names (team data)
  • IP addresses (access data)

Handle exports with appropriate privacy controls.

Common Audit Scenarios

Monthly Compliance Review

  1. Export last month's logs
  2. Review summary statistics
  3. Investigate any anomalies
  4. File report as required

Security Incident Response

  1. Identify timeframe of concern
  2. Export relevant logs
  3. Analyze access patterns
  4. Document findings

Customer Data Request

  1. Search for customer email
  2. Export related events
  3. Prepare data report
  4. Follow GDPR/privacy requirements

Troubleshooting

Missing Events

  • Verify event occurred within retention period
  • Check filter settings
  • Ensure event type is included

Export Fails

  • Try smaller date range
  • Check file size limits
  • Contact support if persistent

Next Steps

  • View Activity Dashboard
  • Monitor Activity Feed
  • Understand email statuses
PreviousActivity FeedNextOverview

Command Palette

Search for a command to run...