Domain Security Info

Auditing

Updated May 1, 2026, 8:26 AM

Every action in the admin interface is recorded in the audit log. The log keeps a complete history of who changed what and when. You can use it for security reviews, troubleshooting, and compliance.

What the audit log records#

The audit system tracks three kinds of activity:

  1. Data changes โ€” Every time someone creates, edits, or deletes a brand, tag, domain, prefix, or other record.
  2. User sessions โ€” When administrators log in, what they do, and when they log out.
  3. Page views โ€” Which admin pages were accessed and by whom.

What each log entry contains#

Action details#

FieldWhat it records
TimestampThe exact date and time of the action.
User emailThe email address of the administrator who did it.
Action typeWhat was done: create, read, update, delete, login, logout, export, or import.
Entity typeWhat kind of data was affected: brand, tag, domain, prefix, user, or system.
Entity IDThe specific item that was changed.
Entity nameA readable name for the item (for example, the brand name or domain).
ChangesThe previous and new values for each field that changed, stored as JSON.
Request method and pathThe HTTP method and URL path of the request.
Response statusThe HTTP status code that was returned.
Response timeHow long the request took, in milliseconds.

Security metadata#

Each log entry also captures network and security data from Cloudflare:

FieldWhat it records
IP addressWhere the request came from.
User agentThe browser or client that made the request.
Country, region, cityThe approximate location of the request.
Cloudflare Ray IDA unique identifier for the request, useful for debugging.
Bot scoreCloudflare's estimate of whether the request came from a bot (0โ€“100). Lower scores look more like bots.
Threat scoreCloudflare's assessment of how risky the request is.
ASN and ASN organizationWhich network the request came from.
WARP statusWhether the request came through Cloudflare WARP.
Device IDA fingerprint that identifies the device.
Authentication methodHow the administrator logged in (SAML, OIDC, or service token).

Risk scoring#

The system automatically calculates a risk score (0โ€“100) for each action based on patterns in the request. It also applies flags for unusual activity:

FlagWhat it means
unusual_ipThe action came from an IP address that this user has not used before.
multiple_failed_loginsSeveral failed login attempts happened before this session.
bulk_deleteA large number of items were deleted in a short time.
off_hours_activityThe action happened outside normal working hours.
rapid_changesMany changes were made in quick succession.

Actions with high risk scores are flagged for review. The score combines the flags above with other context, such as the user's bot score and threat score.

User session tracking#

Each time an administrator accesses the admin interface, the system records a session:

FieldWhat it records
Session IDA unique identifier for this session.
Start timeWhen the session began.
Last activityWhen the administrator last did something.
End timeWhen the session ended.
Actions countHow many actions the administrator took during the session.

How to view the audit log#

  1. Go to Audit Logs under System in the navigation.
  2. Use the filters to narrow the results:By user โ€” Show actions from a specific administrator.By action type โ€” Show only creates, updates, or deletes.By entity type โ€” Show only changes to a specific data type (such as brands or tags).By date range โ€” Show actions within a specific time period.
  3. Click any entry to see its full details, including the before-and-after values.

Understanding change records#

When someone edits a record, the audit log stores both the old and new values. This lets you see exactly what changed.

Example:

{
  "field": "color",
  "old_value": "#4285F4",
  "new_value": "#1A73E8"
}

This tells you that someone changed a brand's color from #4285F4 to #1A73E8.

How to use the audit log#

  • Security reviews โ€” Check that only authorized people are making changes, and that no unexpected edits have happened.
  • Troubleshooting โ€” If a domain lookup shows the wrong badge or label, check the audit log to see if someone recently changed a tag or brand.
  • Compliance โ€” Keep a record of all changes for regulatory requirements or internal governance.
  • Accountability โ€” Every change has a person, a timestamp, and a full record of what was different before and after.

Data retention#

Audit logs are kept according to the system's retention policy. Older logs may be archived or removed based on storage limits and compliance requirements.