14:23:05 User login
14:23:12 Contact viewed
14:23:18 Payment updated
14:23:24 Report exported

Audit Logging

Every action. Every user. Every second.

When questions arise about what happened, when, and by whom, you need answers. Firm App's audit logging captures every meaningful action in an immutable, searchable record - your permanent evidence trail for compliance, investigation, and accountability.

Login Attempts
Data Changes
User Activity
Admin Actions
Config Changes

The Record That Never Forgets

Human memory is unreliable. Spreadsheets can be edited. Emails can be deleted. But audit logs are permanent. When an owner disputes a change to their payment information, when an auditor asks who accessed sensitive data, when you need to investigate a security incident - the audit log tells you exactly what happened.

Our logs aren't just records; they're evidence. They're immutable (no one can modify them), timestamped to the second, and detailed enough to reconstruct exactly what occurred. This isn't just a nice-to-have feature - it's the foundation of accountability in your organization.

What Every Log Entry Captures

DATA_CHANGE
User [email protected]
IP Address 192.168.1.45
Record Contact: James Wilson (#12847)
Field Changed Payment Method
Before "Check"
After "Direct Deposit"
Millisecond Precision

Every event timestamped to the millisecond for precise sequencing

User Attribution

Tied to specific user account - no anonymous actions

Context Captured

IP address, device info, and session details recorded

Before & After

Full values captured, not just "something changed"

What Gets Logged

Every meaningful action in the system generates a log entry. Here's what we capture:

Authentication Events

Every attempt to access the system is logged, successful or not.

Successful logins Failed attempts MFA challenges Password resets Session timeouts Forced logouts

Data Modifications

When records change, we capture exactly what changed and why.

Record creation Field edits Record deletion Bulk updates Import operations Data exports

Administrative Actions

System configuration changes are tracked for security review.

User created Role changes Permission updates Settings modified Integration changes Workflow edits

Access Events

Know who's viewing sensitive information, even without changes.

Record views Report runs Document downloads Search queries Export requests
IMMUTABLE

Logs Cannot Be Altered

Audit logs are write-once. No one - not administrators, not developers, not even Firm App employees - can modify or delete log entries after they're written. This append-only architecture means your audit trail is tamper-evident and legally defensible.

Append-only storage
No delete capability
Cryptographic integrity
Tamper detection

Find What You Need

Millions of log entries are useless if you can't find the one that matters. Our log viewer gives you powerful search and filtering to pinpoint exactly what you're looking for.

Filter by

User Date range Event type Record type IP address

Search for

Keywords Record IDs Field names Values
User: john.smith Last 7 days Type: DATA_CHANGE
247 matching entries

When Audit Logs Save the Day

Security Investigation

When you suspect unauthorized access or a potential breach, audit logs let you trace exactly what was accessed, by whom, and when. Build a timeline, identify compromised accounts, and understand the scope of exposure.

Example: Track all access to sensitive owner data in the 48 hours before an incident was detected

Compliance Audit

When auditors ask how you ensure data integrity, control access, or monitor for violations, audit logs provide the evidence. Export filtered logs showing exactly the controls they want to verify.

Example: Demonstrate that only authorized users accessed payment data during the audit period

Dispute Resolution

When an owner claims they never agreed to a change, or a staff member denies making a modification, the audit log settles the question definitively. Who, what, when - all indisputable.

Example: Prove that payment preferences were changed by the owner via the portal on a specific date

Mistake Recovery

When someone makes an erroneous bulk update or deletes the wrong record, audit logs show exactly what changed. Use the before/after values to restore correct data.

Example: Identify which 200 contacts were affected by a bulk update and restore their original values
Today
1 Year
Archive

Retention & Archival

Audit logs are retained according to your policy requirements. Recent logs are immediately accessible through the interface. Older logs are archived but remain available for investigation or compliance needs.

You can export logs for long-term storage in your own systems, or integrate with SIEM platforms for centralized security monitoring. The data is yours - we just make sure it's captured correctly.

Export & Integration

Export Options

Download filtered results in CSV, JSON, or PDF formats for offline analysis or archival.

Webhook Streaming

Forward audit events in real-time to external systems via configurable webhooks.

SIEM Integration

Feed logs to your security information and event management platform for centralized monitoring.

API Access

Query audit logs programmatically through our API for custom reporting and integration.

Who Can View Audit Logs?

Access to audit logs is itself controlled by permissions and - naturally - logged. This prevents both unauthorized snooping and ensures accountability for those with access.

Controlled Access

Audit log viewing is a specific permission that can be granted or restricted by role. Not everyone needs access to everything.

Logs About Logs

Every time someone views or exports audit logs, that action is itself logged. Complete meta-audit trail.

Scoped Viewing

Users can be limited to viewing logs only for records they have access to - no peeking at data they shouldn't see.

See Your Audit Trail

We'll show you how audit logging works in practice and how it supports your compliance requirements.