Appearance
Audit Log
The audit log provides an immutable, chronological record of every significant action performed in MyEmailVault. It is designed to support compliance audits, incident investigations, and accountability reporting.
Navigating to the Audit Log
Go to Audit Log in the sidebar.
Log Table
Each entry in the audit log displays the following columns:
| Column | Description |
|---|---|
| Timestamp | The date and time the action occurred |
| Actor | The user or API key that performed the action |
| IP | The IP address from which the action was initiated |
| Action | The type of action (e.g., create, update, delete) |
| Target Type | The kind of resource affected (e.g., user, email, policy) |
| Target ID | The unique identifier of the affected resource |
| Details | A summary or additional context about the action |
Sorting and Pagination
The log is sorted by timestamp, with the most recent entries shown first. Use the pagination controls at the bottom of the table to navigate through older entries.
Viewing Full Details
Click on any row to expand the full details of that audit log entry. This includes the complete set of metadata and any before/after values for update actions.
Verifying Log Integrity
Each audit log entry is linked to the previous entry via a cryptographic hash chain. To verify that the chain is intact, click the Verify button.
Verification Results
- Success -- The hash chain is intact. No entries have been removed, inserted, or reordered.
- Chain Broken -- One or more entries have been deleted or inserted outside of normal operation. The position of the break is indicated.
- Tampered -- The data within an individual entry has been altered after it was originally recorded. The affected entry is identified.
A successful verification confirms that the audit log is a complete and unmodified record of all actions since it was initialized.