Skip to main content
Version: 8.9 (unreleased)

Audit log

View and audit a comprehensive record of operations across process, identity, and user task domains.

About

The audit log provides a record of operations, including who performed an operation, when it was performed, and on which entities the operation was performed.

Use the audit log to:

  • Prove compliance: Produce defensible evidence of operation ownership and history during internal and external audits.
  • Meet governance and regulatory requirements: Validate if required steps were followed during case handling, and investigate unauthorized access to sensitive process data.
  • Maintain operational integrity and transparency: See a complete record of actions taken to resolve disputes and investigate SLA breaches.
  • Troubleshoot issues: Review user and client actions that modified or influenced process instances to confirm the sequence of actions that led to a process failure.

Impact on secondary storage

When the audit log is active, a record is written to secondary storage for every applicable operation instance. Because of this, you can expect an increase in disk usage by a factor of 1.5 to 2.0.

warning

The audit log is enabled by default. Because of the increase in resource usage on secondary storage, you may see increased costs associated with this feature.

By default, only user operations are tracked, not client operations. You can configure the audit log to fine tune log thoroughness and resource usage according to your needs:

Get started

Start auditing operations in Operate, Tasklist, and Identity.

Learn the fundamentals

Learn fundamental concepts about how the audit log works and how to access its data.

Explore further resources

Once you have a foundational understanding of the audit log, explore these additional resources: