Audit logs allow realm admins greater visibility into how users access their apps and the types of changes made to data and structure within those apps. Using audit logs, admins can ensure adherence to their organization’s security standards and compliance policies.
Note: Audit logs are included on all plans. Data retention (how long audit data is stored and accessible for compliance or business purposes) varies by plan. Visit the Quickbase Plans and Pricing page for more details.
Access audit logs
Audit logs can be accessed by realm admins for the entire realm, and by app admins and super users for specific apps.
To access audit logs for the entire realm:
- Go to the Admin Console from the global navigation bar 
- Select Audit Logs 
To access audit logs for a specific app:
- Go to App settings from your app 
- Select App management 
- Select Show audit logs 
Types of audit logs
The table below gives an overview of the types of activities tracked by audit logs. Realm admins can view all types of activities from the Admin Console, whereas app admins and super users can only view activities specific to their app.
To view all existing audit logs and how they appear in Quickbase, visit the Audit Log Library.
| Activities | Types | 
|---|
| Data access and changes | App and table searchesApp and table home page accessApp settings accessCode page accessCustom email creation, updates, and deletionDashboard creation, updates, access, and deletionDocument template creation, updates, and deletionEmbedded reports accessForm creation, updates, access, and deletionForm activity through a URL redirectForm properties accessField properties accessField list accessRecord access, creation, modification, or deletionReport access, including through a URL redirectRich text page accessTable settings accessDownloading all forms and users in app when going offline in mobileCalls to API_DoQueryCount, a call which counts the number of records in a table that match a set of criteriaCalls to API_DoQuery, a call which queries records in a table that match a set of criteriaUser accessed data in a table in the appUser accessed data in a table in the app via an APISearches at the app level, including the number of tables searched
 | 
| Group and email domain events | User added to a groupUser removed from a groupAccess for an email domain granted, updated, and revoked
 | 
| Login failures | Login failure due to invalid credentials. For example: Login failure due to an invalid ticket. For example: Login failure due to an invalid user token
 | 
| Pipeline events | Pipeline created/deleted/editedPipeline manually enabled/disabledPipeline disabled due to editingPrompt sent to Pipelines Smart Builder
 | 
| Plugin events |  | 
| Role events | Create a roleDelete a roleUpdate the name of a roleAllow/disallow a user to add records in a tableAllow/disallow a user to save public views in a tableAllow/disallow a user to delete records in a tableAllow/disallow a user to edit field properties in a tableGrant permission to manage users and share the appGrant permission to edit app structure and permissionsGrant permissions to disable access to app for users in the role
 | 
| Schema changes | App creation and deletionTable creation and deletionRelationship creation and deletionField creation and deletionEnabling and disabling offline modeDashboard creation and deletionDashboard updates
 | 
| Solution events | Solution creation and deletionApps: add/delete from a solutionPipelines: add/delete from a solutionContributors: add/delete from a solutionVersion creation and deletionVersion rollbackSolution exported via Solution APISolution created via Solution APISolution updated via Solution APIList of changes to a solution generated via Solution API
 | 
| User events | User creationUser token creation, deletion, activation, deactivation, and transferAll successful log-ins and log-outsUser invited to an appUser granted access to an appUpdate a user's roleRemove a user from an appUser switched to and from a service accountUser assigned and unassigned super user permissions
 | 
Using audit logs