Skip to main contentSkip to navigation
Help Center/Security & Privacy/Understanding Audit Logs
Back to Security & Privacy

Understanding Audit Logs

Track user activity and changes in DealView with the audit log system.

4 min read
Updated 1/30/2026

Audit logs track all significant actions in DealView. Use them for security monitoring, compliance, and investigating issues.

What Gets Logged

DealView logs these activities:

Authentication

  • User login and logout
  • Failed login attempts
  • Password changes
  • MFA enrollment/changes

Contract Actions

  • Contract uploads
  • Contract deletions
  • Contract updates
  • AI analysis requests
  • Export and downloads

User Management

  • User invitations
  • Role changes
  • Permission updates
  • User removal

Settings Changes

  • Workspace settings
  • Integration connections
  • Workflow modifications
  • Security setting changes

API Activity

  • API key creation/rotation
  • API requests (by key)
  • Rate limit events
Log Retention

Audit logs are retained for 90 days on Standard plans and 1 year on Enterprise plans.

Accessing Audit Logs

  1. Go to Settings > Security
  2. Click Audit Log
  3. View recent activity

Requires admin access to view logs.

Log Entry Details

Each log entry includes:

FieldDescription
TimestampWhen the action occurred
UserWho performed the action
ActionWhat was done
ResourceWhat was affected
IP AddressRequest origin
DetailsAdditional context

Filtering Logs

Find specific events:

By Date Range

  • Last 24 hours
  • Last 7 days
  • Last 30 days
  • Custom range

By Action Type

  • Authentication events
  • Contract actions
  • User management
  • Settings changes

By User

Search for activity by specific user.

By Resource

Filter to specific contract or workspace.

Searching Logs

Use the search bar to find:

  • Specific user emails
  • Contract names
  • Action types
  • IP addresses

Exporting Logs

Download logs for external analysis:

  1. Apply desired filters
  2. Click Export
  3. Choose format (CSV or JSON)
  4. Download file
Compliance Exports

For compliance audits, export logs covering the audit period and include all action types.

Common Use Cases

Security Investigation

Find unauthorized access:

  1. Filter by failed logins
  2. Look for unusual IPs
  3. Check for off-hours activity
  4. Review permission changes

Compliance Audit

Prove access controls:

  1. Export user management events
  2. Show who has access to what
  3. Document permission changes
  4. Demonstrate security controls

Troubleshooting

Understand what happened:

  1. Search for specific resource
  2. View all related actions
  3. Check timestamps
  4. Identify root cause

Audit Log API

For Enterprise plans, access logs programmatically:

GET /api/v1/audit/log

Filter with query parameters for date, action type, user, etc.

Best Practices

  1. Review regularly - Check logs weekly for anomalies
  2. Export periodically - Archive logs before retention expires
  3. Investigate promptly - Don't ignore suspicious activity
  4. Document findings - Record security investigations

Related Articles

Was this article helpful?

Need more help? Contact support