Breadcrumbs

Audit trail

The Audit Trails page provides a comprehensive record of all changes made within your system. This chronological log helps you track who made changes, what was modified, and when these modifications occurred—essential for accountability, troubleshooting, and compliance.

image-20250508-115400.png
image-20250508-115438.png


What You Can Monitor

Change History

The audit trail displays a detailed record of all system modifications:

  • Change Type - Whether an item was added, edited, or removed

  • Collection - The category of data that was modified (channels, products, etc.)

  • Path - The specific location or identifier of the changed item

  • User - The name of the person who made the change

  • Date and Time - When the change occurred, shown in precise timestamp format


Filtering Options

At the top of the page, you can refine your view using filters:

  • Date Range - Set "From" and "To" dates to view changes within a specific period

  • Collection - Filter by data category (channels, products, users, etc.)

  • User - See changes made by a specific team member


How to Use Audit Trails

Daily Operations

  • Verify recent changes made by your team

  • Confirm that planned updates were properly implemented

  • Identify unexpected changes that might require attention


Troubleshooting

  • Track down when and how a specific issue was introduced

  • See which user made a particular change that might need correction

  • Review the sequence of changes leading up to a problem


Compliance and Security

  • Maintain records of all system modifications for regulatory requirements

  • Detect unauthorized changes or suspicious activity

  • Document who has accessed or modified sensitive information


Team Management

  • Monitor staff activity and engagement with the system

  • Identify users who might need additional training based on their changes

  • Verify that only authorized personnel are making changes to critical areas


The Audit Trails page is an essential tool for maintaining system integrity and accountability across your business operations. Regular review of this information helps ensure your system remains secure, properly configured, and compliant with your business policies.