Skip to main content

Audit Logs

Admin

The audit log is a comprehensive, immutable record of every significant action taken in HCSS Events Platform. It serves as the central source of truth for compliance auditing, security monitoring, and troubleshooting.

🔒Requires permission: AuditLogs.View

Navigate to Admin > Audit Logs to access the system-wide audit log.

What Gets Logged​

Every permission-protected action in the platform generates an audit log entry. This includes:

User and Authentication Events​

ActionDescription
User LoginA user successfully authenticated (including MFA completion).
User Login FailedA login attempt failed due to incorrect credentials or MFA code.
User LogoutA user explicitly logged out.
Session ExpiredA user's session timed out due to inactivity or maximum duration.
Password ChangedA user changed their own password.
Password Reset RequestedAn admin triggered a password reset for a user.
Password Reset CompletedA user completed a password reset via the emailed link.
MFA EnrollmentA user enrolled in multi-factor authentication.
MFA ResetAn admin reset a user's MFA enrollment.
Account CreatedA new user account was created.
Account DeactivatedA user account was deactivated.
Account ReactivatedA deactivated user account was reactivated.
Role ChangedA user's role was changed.

Event Actions​

ActionDescription
Event CreatedA new event was created.
Event UpdatedEvent details were modified.
Event Status ChangedAn event's status transitioned (e.g., Draft to Planning).
Event ArchivedAn event was permanently archived.
Event DeletedAn event was deleted (only possible in Draft status).

Caregiver and Assignment Actions​

ActionDescription
Caregiver CreatedA new caregiver record was added (manually or via import).
Caregiver UpdatedCaregiver details were modified.
Caregiver ImportedA batch of caregivers was imported via CSV.
Assignment CreatedA new shift assignment was created.
Assignment UpdatedAn assignment was modified.
Assignment DeletedAn assignment was removed.

Survey, Travel, and Operations Actions​

ActionDescription
Survey SentA survey was sent to one or more caregivers.
Survey Response ReceivedA caregiver submitted a survey response.
Travel Booking CreatedA travel arrangement was booked.
Travel Booking UpdatedA travel booking was modified.
Travel Booking CancelledA travel booking was cancelled.
Check-In RecordedAn on-site check-in was recorded for a caregiver.
Work Entry CreatedA shift work tracking entry was recorded.

System and Settings Actions​

ActionDescription
System Setting ChangedA system setting was modified (branding, email, security, notifications).
Reference Data UpdatedA reference data record was added, edited, or deleted (airports, hotels, etc.).
Email SentA system email was dispatched.
Email Delivery FailedAn outbound email failed to deliver.
Report ExportedA user exported a report or data set.

Audit Log Columns​

Each audit log entry contains the following information:

ColumnDescription
TimestampThe exact date and time the action occurred, in UTC. Displayed in the viewer's local time zone.
UserThe name and email of the user who performed the action.
RoleThe role the user had at the time of the action.
ActionThe type of action performed (see categories above).
Entity TypeThe category of object affected (e.g., User, Event, Caregiver, Assignment, SystemSetting).
Entity NameThe specific object affected (e.g., event name, caregiver name, setting name).
DetailsA structured summary of what changed. For update actions, this includes before/after values for each modified field.
IP AddressThe IP address from which the action was performed.
User AgentThe browser and operating system used (useful for identifying suspicious sessions).

Filtering the Audit Log​

The audit log can grow to millions of entries over time. Use the filter controls to narrow your search:

Filter Options​

FilterDescriptionExamples
UserFilter by the user who performed the action. Type to search by name or email."Jane Doe", "jane@example.com"
ActionFilter by action type. Select from a dropdown of all logged action types."User Login", "Event Created", "System Setting Changed"
Entity TypeFilter by the category of object affected."User", "Event", "Caregiver", "Assignment", "SystemSetting"
Date RangeFilter by the time window in which the action occurred. Select a start date and end date.Last 24 hours, Last 7 days, Custom range
IP AddressFilter by the source IP address. Useful for investigating suspicious activity from a specific location."192.168.1.100", "10.0.0.0/8"

Using Filters Effectively​

  • Combine filters -- all filters are additive (AND logic). For example, filtering by User = "Jane Doe" AND Action = "User Login" AND Date Range = "Last 7 days" shows only Jane's login events in the past week.
  • Quick presets -- use the date range presets (Last 24 Hours, Last 7 Days, Last 30 Days, This Month, Last Month) for common time windows.
  • Clear filters -- click the Clear All Filters button to reset the view to show all entries.
tip

To investigate a specific incident, start by filtering on the Date Range to narrow the time window, then add the User or Entity Type filter to focus on the relevant entries.

Viewing Entry Details​

Click on any audit log row to expand the Details panel. The details panel shows:

  • Full action description -- a human-readable sentence describing the action.
  • Before/After values -- for update actions, a side-by-side comparison of the old and new values for each changed field.
  • Related entities -- links to the affected entities (e.g., a link to the event detail page, user profile, or caregiver record).
  • Request metadata -- technical details including the API endpoint, HTTP method, and request ID (useful for developer troubleshooting).

Exporting Audit Data​

🔒Requires permission: AuditLogs.Export

The audit log can be exported for external analysis, compliance reporting, or archival.

Export Formats​

FormatDescriptionBest For
CSVComma-separated values file. Each row is one audit entry.Spreadsheet analysis in Excel or Google Sheets.
JSONStructured JSON array. Each element is one audit entry with full detail.Integration with external SIEM tools or log aggregators.
PDFFormatted report with a summary table and optional detail sections.Compliance reporting and management reviews.

How to Export​

  1. Apply the desired filters to narrow the data set. The export will include only the filtered results.
  2. Click the Export button in the top-right corner.
  3. Select the desired format (CSV, JSON, or PDF).
  4. For PDF exports, choose whether to include the full details or summary only.
  5. Click Download.
note

Exports are limited to 50,000 entries per file. If your filtered results exceed this limit, narrow the date range or add more specific filters and perform multiple exports.

Export Audit Trail​

Every export action is itself logged in the audit log. This means you can track who exported audit data, when, and what filters were applied -- important for compliance oversight.

Retention and Immutability​

  • Retention period -- audit log entries are retained for a minimum of 7 years to comply with healthcare regulatory requirements.
  • Immutability -- audit log entries cannot be modified or deleted by any user, including Admins. This ensures the integrity of the audit trail.
  • Tamper protection -- entries are stored with integrity checksums. Any unauthorized modification of the underlying data is detectable.

Common Use Cases​

Investigating Unauthorized Access​

  1. Filter by Action = "User Login Failed" and review the Date Range for the suspicious period.
  2. Check the IP Address column for login attempts from unexpected locations.
  3. Cross-reference with Action = "User Login" to see if any successful logins occurred from the same suspicious IP.
  4. Review the affected user's activity by filtering on their name.

Tracking Configuration Changes​

  1. Filter by Entity Type = "SystemSetting".
  2. Review the Details column to see before/after values for each changed setting.
  3. Verify that changes were made by authorized personnel (check the User and Role columns).

Compliance Reporting​

  1. Set the Date Range to the reporting period (e.g., last quarter).
  2. Export the full log in CSV or PDF format.
  3. For HIPAA compliance, focus on events related to caregiver records (Entity Type = "Caregiver") and any data exports (Action = "Report Exported").

Debugging User Issues​

  1. Filter by the specific User who reported the issue.
  2. Set the Date Range to the time window when the issue occurred.
  3. Review the sequence of actions to understand what the user did and where the workflow may have broken.

Best Practices​

  1. Review the audit log regularly -- do not wait for an incident. Conduct weekly or monthly reviews of key action types (logins, setting changes, data exports).
  2. Set up alerts for sensitive actions -- use the notification settings to receive alerts for high-risk actions like role changes, system setting modifications, and failed login spikes.
  3. Export for off-site backup -- periodically export audit data to an external system for redundancy. While the platform retains logs for 7 years, maintaining your own backup ensures access even if the platform is unavailable.
  4. Document your audit procedures -- create a standard operating procedure for how your organization reviews and responds to audit log findings. This is valuable for regulatory audits.
  5. Train your team -- ensure that all Admin users understand how to use the audit log and what to look for during routine reviews.

Next Steps​

  • User Management -- investigate specific users identified in the audit log.
  • System Settings -- review settings that may have been changed.
  • Email Outbox -- investigate email delivery issues identified in the audit log.