Audit log

Audit logs provide a detailed record of user activities, system changes, and administrative actions to support security monitoring, compliance requirements, troubleshooting, and operational visibility.

Benefits

Security & Compliance: Track access patterns, detect unauthorized activities, and maintain audit trails for compliance frameworks such as System and Organization Controls 2 (SOC 2), International Organization for Standards (ISO 27001), General Data Protection Regulation (GDPR), and Health Insurance Portability and Accountability Act of 1996 (HIPAA).

Operational Visibility: Monitor configuration changes, track policy modifications, and understand system usage patterns.

Troubleshooting: Investigate issues by reviewing the sequence of events leading to a problem or configuration change.

Accountability: Maintain clear attribution of all actions to specific users with timestamps and contextual information.

Accessing the audit log

Superusers reach the audit log by clicking the settings cog in the header, then Audit Log as shown.

screenshot of how to access the audit log

Downloading an audit log

Use these steps to download an Audit Log:

NOTE  Audit logs use (Coordinated Universal Time) UTC.
Date ranges are applied in UTC, which may differ from your local time.

  1. Enter a From Date or pick a date from the calendar.
  2. Enter a To Date or pick a date from the calendar.
  3. Click Download CSV File.
  4. The Audit Log file will download in your web browser.

Audit log events reference

User management & authentication events

Event Type Captured Information
User Login Success Username, source IP address, authentication method (portal, RMM), timestamp, session ID
User Login Failure Username, source IP address, authentication method, failure reason, timestamp
User Logout Username, logout type (manual or timeout), session duration, timestamp
MFA Enrollment Username, MFA method enrolled, enrollment status, timestamp
MFA Verification Username, verification status (success/failure), MFA method used, timestamp
Password Change Username, change initiated by (user/admin), timestamp
Password Reset Username, requested by, timestamp
User Account Lockout Username, lockout reason (failed attempts), timestamp
User Account Unlock Username, unlocked by (admin/automatic), timestamp
User Account Creation New username, created by, assigned role, initial permissions, timestamp
User Account Deactivation Username, deactivated by, reason, timestamp, data retention status
Invitation Sent Recipient email, invited by, role assigned, invitation expiration date, timestamp
Invitation Accepted New username, invitation acceptance timestamp, account activation date
Invitation Expired Recipient email, original inviter, expiration timestamp, resend status

Group & role management events

Event Type Captured Information
Group Creation Group name, created by, initial members, permissions assigned, timestamp
Group Modification Group name, modified by, changes made (org. names, description, permissions), previous values, new values, timestamp
Group Deletion Group name, deleted by, number of affected users, timestamp, related policy impacts
User Added to Group Username, group name, added by, timestamp, inherited permissions
User Removed from Group Username, group name, removed by, timestamp, permission changes
User Added to Role Username, role name, assigned by, timestamp, granted permissions
User Removed from Role Username, role name, removed by, timestamp, revoked permissions

Endpoint backup v2 management events

Event Type Captured Information
Endpoint Deployment Endpoint name, hostname, IP address, OS type/version, deployed by, deployment token used, timestamp, agent version
Endpoint Deletion Endpoint name, hostname, deleted by, deletion reason, backup retention policy, timestamp, last backup date
Endpoint Paused Endpoint name, paused by, pause reason, timestamp, scheduled resume date
Endpoint Started/Resumed Endpoint name, started by, timestamp, last backup date before pause
Endpoint License Change Endpoint name, previous license type, new license type, changed by, timestamp, billing impact
Endpoint Policy Assignment Endpoint name, previous policy, new policy, assigned by, timestamp, effective date

Backup policy management events

Event Type Captured Information
Policy Creation Policy name, created by, initial configuration (schedule, retention, throttling), timestamp, assigned endpoints count
Policy Edit Policy name, edited by, modified fields, previous values, new values, timestamp, affected endpoints count
Policy Deletion Policy name, deleted by, number of affected endpoints, reassignment policy, timestamp
Policy Duplication Source policy name, new policy name, duplicated by, timestamp
Policy Rename Previous policy name, new policy name, renamed by, timestamp
Policy Description Update Policy name, previous description, new description, updated by, timestamp
Retention Change Policy name, previous retention settings, new retention settings, changed by, timestamp, data impact estimate
Backup Schedule Change Policy name, previous schedule, new schedule, changed by, timestamp, next backup time
Throttling Configuration Change Policy name, previous throttling settings, new throttling settings, changed by, timestamp
Alerting Threshold Override Policy name, threshold type, previous value, new value, overridden by, timestamp
Selective Backup Enabled/Disabled Policy name, enabled status, configured by, timestamp, scope
Selective Backup Inclusion Added Policy name, included path/file type, added by, timestamp, estimated impact
Selective Backup Exclusion Added Policy name, excluded path/file type, added by, timestamp, estimated impact

Deployment token management events

Event Type Captured Information
Deployment Token Creation Token name, created by, associated organization, expiration date, usage limit, timestamp, default policy
Deployment Token Deletion Token name, deleted by, associated organization, deletion reason, timestamp, endpoints deployed with token
Deployment Token Used Token name, endpoint deployed, deployment timestamp, remaining uses, IP address

Restore operations – file-level restore

Event Type Captured Information
File Restore Initiated Endpoint name, restore point date/time, initiated by, selected files/folders, restore destination, timestamp
File Restore Completed Endpoint name, restore point used, completion status, files restored count, total size, duration, timestamp
File Restore Failed Endpoint name, restore point attempted, failure reason, initiated by, error details, timestamp
Encryption Key Error Endpoint name, restore point date, incorrect key attempt, attempted by, timestamp, lockout status

Restore operations – multi-version file restore

Event Type Captured Information
Multi-Version Restore Initiated Endpoint name, file path, version selection, initiated by, restore destination, timestamp
Multi-Version Restore Completed Endpoint name, file path, versions restored, total size, completion status, duration, timestamp
Multi-Version Encryption Key Error Endpoint name, file path, incorrect key attempt, attempted by, timestamp

Restore operations – bare metal restore (bmr)

Event Type Captured Information
BMR Initiated Endpoint name, restore point date/time, initiated by, target hardware information, timestamp
BMR Agent Code Generated Endpoint name, agent code, generated by, expiration time, timestamp
BMR Agent Code Used Endpoint name, agent code, used by, source IP, timestamp
BMR Encryption Key Error Endpoint name, restore point, incorrect key attempt, attempted by, timestamp
BMR Completed Endpoint name, restore point used, completion status, duration, restored data size, timestamp
BMR Failed Endpoint name, restore point attempted, failure reason, error details, timestamp

Reporting & analytics events

Event Type Captured Information
Report Creation Report name, report type, created by, organization scope, scheduling configuration, recipient list, timestamp
Report Deletion Report name, deleted by, timestamp, final run date
Report Modification Report name, modified by, changed fields, previous values, new values, timestamp
Report Execution Report name, executed by, execution type (manual/scheduled), organization scope, timestamp, record count

Audit log column reference

Id

Description: Uniquely identifies the audit event
Type: Universally Unique Identifier (UUID)
Notes: Used to correlate events across systems or logs

TenantId

Description: Uniquely identifies the tenant
Type: Universally Unique Identifier (UUID)
Notes: Used to correlate events across tenants

TimestampUTC

Description: Date and time when the event occurred
Type: ISO‑8601 timestamp
Notes: Stored in UTC

WorkflowId

Description: Date and time when the event occurred
Type:ISO‑8601 timestamp
Notes: Stored in UTC

WorkflowType

Description: Date and time when the event occurred
Type:ISO‑8601 timestamp
Notes: Stored in UTC

EventType

Description: Describes what action was performed
Type: String
Examples: Create, Update, Delete, Login, Logout

EventDescription

Description:Describes the event
Type: String

Initiator

Description: Identifies who initiated the action
Type: String
Common values: user, system, service

InitiatorType

Description: Identifies what initiated the action
Type: String
Common values: user, system, service

InitiatorId

Description: Identifier of the user or system that performed the action
Type: String
Notes: May map to a user ID, service account, or internal identifier

Target

Description: Identifies the specific object acted upon
Type: String
Notes: Used with target_type to pinpoint the affected entity

TargetType

Description: Type of object affected by the action
Type: String
Examples: Account, Device, Policy, Record

TargetId

Description: Identifies the specific object acted upon
Type: String
Notes: Used with target_type to pinpoint the affected entity

OperationStatus

Description: Indicates whether the action succeeded or failed
Type: String
Common values: success, failure

Javascript object notation (json) reference

Os

Description: Operating system installed on the asset at the time of the event.
Type: String
Example: windows

Mac

Description: Primary Media Access Control (MAC) address associated with the asset.
Type: String

Name

Description: Human-readable name assigned to the asset.
Type: String

Status

Description: Current operational state of the asset.
Type: String
Common values: online, offline, paused

Policyid

Description: Unique identifier of the backup or protection policy applied to the asset.
Type: String (UUID)

V1agentid

Description: Identifier of the legacy (v1) agent associated with the asset, if applicable.
Type: String

Licencetype

Description: License Stock Keeping Unit (SKU) assigned to the asset.
Type: String
Example: Kaseya 365

Macaddresses

Description: List of all MAC addresses detected for the asset.
Type: Array of strings

Backupenabled

Description: Indicates whether backup functionality is enabled for the asset.
Type: Boolean

Organizationid

Description: Identifier of the organization that owns the asset.
Type: String (UUID)

Storageusedbytes

Description: Total amount of storage currently consumed by the asset.
Type: Integer (bytes)

Updatedtimestamp

Description: Timestamp of the most recent update to the asset metadata.
Type: ISO‑8601 timestamp

Hascustomermanagedkey

Description: Indicates whether customer‑managed encryption keys are enabled.
Type: Boolean

Timezoneoffsetminutes

Description: Time zone offset from UTC, in minutes, for the asset location.
Type: Integer

Usage notes

  • Filter by action, result, or actor_id to isolate relevant activity.
  • Sort by event_timestamp to reconstruct timelines.
  • Copy JSON fields into a JSON-aware tool for deeper analysis.