- What is the Audit Log in KEBS?
The Audit Log in KEBS is a comprehensive record of every action performed across the platform. It provides full transparency on system activity, user actions, configuration changes, and data updates, supporting internal governance, external compliance, and security investigations.
To access it, navigate to .
- What types of activities are captured in the audit log?
The KEBS audit log captures a wide range of activities, including:
- User Logins: Successful logins, failed attempts, SSO sign ins, and MFA challenges.
- Data Changes: Record creation, edits, deletions, and merges.
- Approvals: Timesheet, leave, expense, deal, and quote approvals.
- Configuration Changes: Workflow updates, role changes, master data edits.
- Integration Activity: Sync events with third party systems.
- Document Activity: Uploads, downloads, edits, deletions, and shares.
- Who can access the audit log?
Access to the audit log is restricted to administrators, super users, and security or compliance officers. Permissions are governed by role based access controls, ensuring only authorized personnel can review sensitive activity records.
- How long are audit logs retained?
KEBS retains audit logs for the period required to meet compliance and customer needs, generally aligned with standards such as ISO 27001 and SOC 2 Type 2. Specific retention periods can be configured under .
- Can I filter audit log entries?
Yes. KEBS supports filtering audit log entries by user, action type, module, date range, IP address, and outcome. Saved filter sets help administrators monitor recurring activity types and respond quickly to anomalies.
- How do I investigate a specific user’s activity?
Apply the User filter in the audit log view and select the user in question. KEBS displays a chronological list of all actions performed by that user, including login times, records modified, approvals granted, and configuration changes.
- Can audit logs be exported for external review?
Yes. Audit logs can be exported in CSV, Excel, or PDF formats for offline review, compliance audits, or external reporting. Apply the desired filters and click Export to download the report.
- Are configuration changes captured in the audit log?
Yes. Every change to system settings, workflows, master data, integrations, and roles is captured in the audit log. This is critical for ensuring traceability of who made what change and when.
- Does the audit log capture data deletions?
Yes. Both soft deletions (archives) and permanent deletions are logged with full details, including the affected record, the user, the timestamp, and the reason if provided. This supports both governance and recovery scenarios.
- Can audit logs be used for compliance audits?
Yes. The KEBS audit log is designed to meet the evidentiary requirements of compliance frameworks including ISO 27001, AICPA SOC 2 Type 2, and GDPR. Auditors can review log entries directly or through exported reports.
- Are integrations and API actions logged?
Yes. API calls, integration sync events, and third party platform interactions (including HubSpot, Salesforce, SAP, Microsoft 365, and others) are captured in the audit log, providing transparency on automated and external activity.
- Can I set up alerts for suspicious audit activity?
Yes. Administrators can configure alerts for suspicious patterns such as repeated failed logins, large scale data exports, or off hours configuration changes. Alerts can be delivered via email, in app notifications, or Microsoft Teams.
- Does the audit log capture IP addresses and device information?
Yes. KEBS captures the IP address, device type, and browser used for each action, supporting forensic investigations and identifying potentially unauthorized access attempts.
- Can the audit log be tampered with or modified?
No. Audit logs in KEBS are immutable and cannot be edited or deleted by any user, including administrators. This ensures the log remains a trusted source for compliance reviews and security investigations.
- How does the audit log support data subject requests under GDPR?
The audit log helps fulfill GDPR data subject requests by tracking who accessed, modified, or deleted personal data. This transparency supports your organization in meeting GDPR’s right to access, right to rectification, and right to be forgotten obligations.
- Can I view audit logs at the record level?
Yes. In addition to the central audit log view, every record in KEBS (lead, account, opportunity, project, employee profile, expense claim, etc.) has its own activity history. This makes it easy to review the full change history of a specific record without filtering the central log.
- Does the audit log support timestamp comparison and version diffs?
Yes. For data changes, the audit log displays both the previous and new values, allowing administrators to see exactly what changed in a record. This is particularly useful for resolving disputes and verifying data integrity.
- How is the audit log protected from unauthorized access?
The audit log is protected through encryption, strict role based access controls, and is itself subject to audit logging. KEBS is ISO 27001 certified, AICPA SOC 2 Type 2 compliant, and GDPR aligned, ensuring enterprise grade protection of audit data.
- Can I integrate the audit log with external SIEM tools?
Yes. KEBS supports integration with leading security information and event management (SIEM) tools through API based log forwarding. This enables organizations to centralize KEBS audit data within their broader security monitoring framework.
- How do I get started with the KEBS Audit Log?
The audit log is enabled by default for every KEBS deployment. Request a demo through the KEBS website if you would like the implementation team to walk you through retention configuration, alert setup, SIEM integration, and best practices for compliance audits.
Audit Log FAQs
5 min read
Updated on May 20, 2026
Powered by BetterDocs



