Reviewing the Audit Log
In this article, you will find:
Navigation guidance for accessing the Audit Log area.
Key information about using the audit log.
Accessing the Audit Log
Audit logs serve as a record of any changes or alterations made within a business’s IT systems. Auditors can use these record to examine configurations, cross-reference settings against security standards, and determine whether an organisation has been in compliance with a cyber security framework or standard.
To access the Audit Log area, navigate to Audit & Assessment > Audit Log on the navigation bar, as shown below:

Reviewing Audit Logs
Once inside the Audit Log area, you will see a table similar to the following:

See below for information regarding each section within the Audit Log:
Date & Time: Shows the exact time and date that a change took place.
Zone: The area that was affected or changed.
Sub-type: Indicates what event occurred during that event, such as an automation taking place, or a policy being created.
Detail: Gives a quick overview of the event, and why the sub-type was assigned.
User: The name of the software or user that authorised the change.
There is also an Export option at the top right of the page. This button allows you to download the table as a .csv file, making it easy to include this data in internal reports or provide it as evidence for an audit. All tables, charts, and graphs within the platform are free to be exported and used in documents, reports, or any other desired method.
Important note: Any process or automation completed within the OneClickComply platform is automatically recorded within the Audit Log. There is no option to edit, alter, or delete any of the information contained within these logs.