Skip to content

Audit Log

The audit log provides an immutable, chronological record of every significant action performed in MyEmailVault. It is designed to support compliance audits, incident investigations, and accountability reporting.

Go to Audit Log in the sidebar.

Log Table

Each entry in the audit log displays the following columns:

ColumnDescription
TimestampThe date and time the action occurred
ActorThe user or API key that performed the action
IPThe IP address from which the action was initiated
ActionThe type of action (e.g., create, update, delete)
Target TypeThe kind of resource affected (e.g., user, email, policy)
Target IDThe unique identifier of the affected resource
DetailsA summary or additional context about the action

Sorting and Pagination

The log is sorted by timestamp, with the most recent entries shown first. Use the pagination controls at the bottom of the table to navigate through older entries.

Viewing Full Details

Click on any row to expand the full details of that audit log entry. This includes the complete set of metadata and any before/after values for update actions.

Verifying Log Integrity

Each audit log entry is linked to the previous entry via a cryptographic hash chain. To verify that the chain is intact, click the Verify button.

Verification Results

  • Success -- The hash chain is intact. No entries have been removed, inserted, or reordered.
  • Chain Broken -- One or more entries have been deleted or inserted outside of normal operation. The position of the break is indicated.
  • Tampered -- The data within an individual entry has been altered after it was originally recorded. The affected entry is identified.

A successful verification confirms that the audit log is a complete and unmodified record of all actions since it was initialized.