Audit Log
The Audit Log tracks every administrative action across the Watchgrid platform, providing a complete trail of who did what and when.
Viewing the Audit Log
Go to System → Audit Log to browse all recorded events.
Filters
- Tenant Filter — (super-admin only) filter events by tenant
- Action Type — filter by specific action (dropdown populated dynamically):
user_create,user_deletedevice_delete,device_unlocktenant_create,tenant_deletedns_create,dns_deletepassword_changetoken_regenerate- And more as features are used
- Limit — show 50, 100, 250, or 500 events
- Refresh — reload the log
- Clear Filters — reset all filters
Events Table
| Column | Description |
|---|---|
| Timestamp | When the action occurred |
| Admin User | Who performed the action |
| Action | Color-coded action type badge |
| Resource | The affected resource (device ID, username, tenant, etc.) |
| Details | Additional context about the action |
Events are sorted newest-first.
What Gets Logged
All administrative actions are recorded, including:
- User creation, deletion, and password changes
- Device approval, deletion, and tenant unlocking
- Tenant creation and deletion
- DNS record changes
- SSH certificate issuance and revocation
- Provisioning profile changes
- License activation and revocation
- Token regeneration