Skip to main content

Documentation Index

Fetch the complete documentation index at: https://workllm.mintlify.app/llms.txt

Use this file to discover all available pages before exploring further.

WorkLLM records a complete audit trail of significant actions taken by users and AI systems in your workspace. Audit logs are available to Admins and are designed to support internal security reviews, incident investigation, and compliance reporting. This page explains what is logged, how to access and search logs, and how to export them.

What audit logs capture

Audit logs record actions across six categories: authentication, membership, settings, integrations, AI activity, and data operations. Every log entry includes the timestamp, the user or system that performed the action, and relevant context such as the affected resource.

Audit event reference

EventCategoryDescription
user.loginAuthenticationA member signed in to the workspace
user.login_failedAuthenticationA failed login attempt on a workspace account
user.logoutAuthenticationA member signed out of the workspace
member.invitedMembershipAn Admin sent an invitation to a new member
member.invitation_revokedMembershipAn Admin cancelled a pending invitation
member.joinedMembershipA new member accepted an invitation and joined
member.role_changedMembershipAn Admin changed a member’s role
member.removedMembershipAn Admin removed a member from the workspace
sso.configuredSettingsSSO settings were added or updated
sso.disabledSettingsSSO was disabled for the organization
settings.updatedSettingsOrganization settings were changed (includes what changed)
integration.connectedIntegrationsA new integration was connected to the workspace
integration.disconnectedIntegrationsAn integration was removed from the workspace
integration.token_refreshedIntegrationsAn integration’s OAuth token was refreshed
agent.run_startedAI activityAn AI Agent began executing a workflow
agent.run_completedAI activityAn AI Agent completed a workflow run
agent.run_failedAI activityAn AI Agent workflow failed
assistant.createdAI activityA new AI Assistant was created
assistant.deletedAI activityAn AI Assistant was deleted
data.exportData operationsA data export was initiated (includes export type and requested by)
audit_log.exportedData operationsAn audit log export was downloaded
document.uploadedData operationsA document was uploaded to the workspace
document.deletedData operationsA document was deleted from the workspace
billing.plan_changedSettingsThe organization’s plan was upgraded or downgraded
AI model interactions (individual messages and responses within a thread) are not individually recorded in the audit log. Audit logs focus on administrative and structural actions. Usage analytics for AI interactions are available in Reports.

Accessing audit logs

Audit logs are only accessible to Admins. Members and Viewers cannot view audit log data.
1

Open Settings

Click Settings in the left sidebar of your WorkLLM workspace.
2

Go to Security

Select Security from the Settings navigation.
3

Open Audit Logs

Click Audit Logs. The log viewer shows the most recent events by default, with the newest entries at the top.

Filtering audit logs

The audit log viewer includes filters that help you narrow down events when investigating a specific incident or preparing a compliance report.
FilterDescription
Date rangeShow only events within a specific start and end date
UserFilter to events performed by a specific member
Event typeFilter to a specific event category or individual event type
IP addressFilter to events from a specific IP address (useful for investigating suspicious logins)
You can combine multiple filters. For example, to see all role changes made in the last 30 days, set the date range to the last 30 days and filter by event type member.role_changed.

Exporting audit logs

Audit logs can be exported as a CSV file for use in spreadsheets, SIEM tools, or compliance reporting workflows.
1

Apply your filters

Use the date range, user, and event type filters to scope the export to the data you need. Exporting the full log history is supported but may produce a large file.
2

Click Export

Click the Export button in the top-right corner of the Audit Logs page.
3

Download the CSV

WorkLLM generates the CSV file and downloads it to your browser. The file includes all columns shown in the log viewer: timestamp, event type, user, IP address, and event details.
The exported CSV includes the following columns:
ColumnDescription
timestampUTC timestamp of the event in ISO 8601 format
event_typeThe event identifier (e.g., member.role_changed)
actor_nameDisplay name of the user or system that performed the action
actor_emailEmail address of the user that performed the action
ip_addressIP address from which the action was performed
resource_typeThe type of resource affected (e.g., member, integration)
resource_idThe identifier of the affected resource
detailsAdditional context specific to the event type
Each audit log export is itself recorded as an audit_log.exported event, so you have a record of who downloaded log data and when.

Audit log retention

PlanRetention period
Business12 months
Enterprise24 months
Audit log retention periods cannot be shortened, as they exist to support compliance requirements. Logs older than the retention period are automatically deleted. If your organization requires longer retention periods, contact info@workllm.io to discuss options available on Enterprise plans.

Using audit logs for compliance reporting

Audit logs are structured to support common compliance use cases: Access reviews — Filter by member.role_changed, member.invited, and member.removed to produce a complete record of who had access to your workspace, when they were granted access, and when it was revoked. Authentication monitoring — Filter by user.login and user.login_failed to review sign-in activity and identify suspicious patterns such as repeated failed logins or logins from unexpected locations. Integration governance — Filter by integration.connected and integration.disconnected to maintain a record of which third-party services were connected to your workspace and who authorized each connection. AI Agent oversight — Filter by agent.run_started, agent.run_completed, and agent.run_failed to document automated AI activity in your workspace for governance purposes. Data export tracking — Filter by data.export and audit_log.exported to see who has exported data from your workspace and when. For SOC 2 audits, the audit log export CSV can be provided directly to auditors as evidence of access control and monitoring controls. Enterprise customers can contact info@workllm.io for guidance on mapping audit log events to specific SOC 2 trust service criteria.
Audit logs are read-only and cannot be modified or deleted before their retention period expires. Do not rely on audit log deletion as a data management strategy — plan your retention needs carefully.