Overview
Audit Log provides a record of who did what and when in your Incydr environment. Some uses of the Audit Log include:
- Determine how your environment ended up in its current state.
- Spot check the work of security analysts to prevent abuse of privileged access.
- Identify areas of training for users that caused inadvertent changes.
This article provides descriptions of each item in the Audit Log in the Incydr console.
For information about the details that appear for events, see Audit Log event details.
The Audit Log in the Incydr console allows you to quickly search events and export the results to a comma-separated-values (CSV) file. While this is helpful to quickly perform spot checks, instead use the API if you need to export events to your internal security team tools. See Audit Log in the Developer Portal.
Considerations
- You must have the Audit Log Viewer role to view events in the Audit Log.
- The Audit Log records events for the last 90 days. If you want to maintain Audit Log output for longer than 90 days, export the results to your own systems for storage.
- While there is no limit to the number of events recorded in Audit Log, you can export only a maximum of 100,000 events at once. To work around this limitation, see Troubleshooting.
- Events that are recorded in the Audit Log can originate from actions taken in the Incydr console, Incydr APIs, an integration with Incydr, or an external user provisioning system.
- Event results are returned within five minutes of the event occurrence. Although event results of different event types are returned at different intervals, they are always listed in the order they occurred.
- In addition to the Incydr console, you can also use the API to query Aduit Log.
- For information about how to ingest Audit Log events into Splunk, see Install and manage the Code42 Insider Threat app for Splunk.
Audit Log in the Incydr console
To view the Audit Log:
- Sign in to the Incydr console.
- Select Administration > Status > Audit Log.
- To view details of an event, click View details
.
For information about event details, see Audit Log event details.Item Description a Export Export the filtered events to a comma-separated values (CSV) file. b Filter Filter the events by the criteria you select. c Filtered by The filters that are currently applied to the Audit Log events. Click the X to remove that filter. Remove all filters to view all events. d Username The username associated with the event. e Event type The event type logged.
f Date observed Date and time the event occurred. The time is reported in Coordinated Universal Time (UTC). g IP address Public IP address involved in the event. h View detail Click to view event details. Includes event type, date observed, and device details.
For details, see Audit Log event details.
Filter
To filter the events listed in the Audit Log, click Filter and select the criteria to use. When you click Apply, events that match all filters appear in the list.
| Item | Description | |
|---|---|---|
| a | Username | Returns events triggered by a specific user. Use commas to separate multiple usernames. |
| b | Resource ID |
Search for events related to a specific resource's ID. Resources whose IDs you can search for include:
|
| c | User type |
The type of user to search for:
|
| d | Date range |
Filters the list by the selected date range. Select Custom to enter start and end dates to use to filter events. You can also select All dates to view all events that have been logged. |
| e | Event type |
Filters results by event types. All events filters by all available event types. Event types are organized into categories. Select All events in a category to filter by all available event types in that category. See the Event types section below for a description of each event type.
|
| f | IP address | Filters the events by a specific public IP address involved in the event. Use commas to separate multiple IP addresses. |
| g | Cancel / Apply | Click Apply to apply the selected filter criteria to the list and display only the events that match that criteria. To return to the list without applying any filters, click Cancel. |
Export
Click Export to export the filtered events in the Audit Log to a comma-separated values (CSV) file. Any filters that are applied are shown above the Audit Log list. Click the X on a filter to remove that filter from the exported results.
In addition to exporting events to CSV in the Incydr console, you can also export events with the API. See Audit Log in the Developer Portal.
Event types
Following are the kinds of events that appear in the Audit Log.
Account name added
This event means that a corporate cloud account name has been added to trusted activity.
Account name changed
This event means that a change has been made to a corporate cloud account name or description in trusted activity.
Account name deleted
This event means that a corporate cloud account name has been removed from trusted activity.
Activate user
This event means that a user was reactivated. Reactivation occurs after a user had been previously deactivated.
Add user
This event means that a new user was added in Incydr.
An empty value for fields in this event type may result from the initial intake of users from your environment into the Audit Log. See Troubleshooting.
Alert note edited
This event means that a note on an alert was changed.
Alert rule created
This event means that an alert rule was created.
Alert rule deleted
This event means that an alert rule was deleted.
Alert rule disabled
This event means that an alert rule was disabled.
Alert rule edited
This event means that an alert rule was edited.
Alert rule enabled
This event means that an alert rule was enabled.
Alert state changed
This event means that an alert's state changed. Following are the possible states:
- Open: The alert has not been reviewed.
- In progress: The alert is under review.
- Pending response: Response to the alert is pending.
- Dismissed: The alert is resolved.
All users removed from alert rule
This events means that all users were removed from an alert rule by the Incydr API, py42, or CLI, but not the Incydr console. If all users are removed from an alert rule in the Incydr console, it triggers an Alert rule edited event.
API client created
This event means that an an API client was created.
API client deleted
This event means that an an API client was deleted.
API client description changed
This event means that an API client's description was changed.
API client name changed
This event means that an API client's name was changed.
API client permissions assigned
This event means that read or write API permissions were given to an API client.
API client permissions revoked
This event means that read or write API permissions were removed from an API client.
API client secret reset
This event means that an API client's secret was reset.
Case archived
This event means that a case was archived.
Case assignee changed
This event means that the person who is assigned to take a case has been changed.
Case closed
This event means that a case was closed.
Case created
This event means that a case was created.
Case deleted
This event means that a case was permanently deleted.
Case exported
This event means that a case was exported.
Case file event added
This event means that a file event was added to a case.
Case file event removed
This event means that a file event was removed from a case.
Case subject changed
This event means that the person who the case is about was changed.
Checksum purged
This event means the file contents for an exfiltrated file were removed from the Incydr cloud. This occurs when a security analyst or administrator selects Delete file contents from the file event details.
Cloud alias added
This event means that a cloud alias was added to a user profile.
A cloud alias is an email alias other than the Incydr username that the user utilizes for cloud services such as Google Drive, OneDrive, or Box. Only one alias can be added for each user.
Cloud alias removed
This event means that a cloud alias was removed from a user profile.
Console login
This event means that a login to the Incydr console was recorded. The login could be from a direct user sign-in, a user signing in with single sign-on (SSO), or a sign-in initiated with an API call from the Incydr API or an integration. If the sign-in is initiated with an API call, the User agent field displays details of the API.
Content inspection entity created
This event means that a custom file content risk indicator was created.
Content inspection entity deleted
This event means that a custom file content risk indicator was deleted.
Content inspection entity updated
This event means that a custom file content risk indicator was updated.
Deactivate user
This event means that a user was deactivated. A user can be deactivated for many reasons, from leaving the company to being removed from a provisioning system. For more information about user deactivation performed by provisioning systems, see our articles on SCIM provisioning and User Directory Sync.
Department added to watchlist definition
This event means that a department was added to a watchlist.
Department removed from watchlist definition
This event means that a department was removed from a watchlist.
Domain added
This event means that a domain has been added to the list of trusted activity in data preferences.
Domain changed
This event means that a domain has been changed in the list of trusted activity in data preferences.
Domain deleted
This event means that a domain has been removed from the list of trusted activity in data preferences.
Email change
This event means that a user's email address was changed. The user's email address is also their Incydr username. Therefore, a change to a user's email address also results in a Username change event.
Excluded users added to watchlist definition
This event means that certain users in a department or directory group were excluded from a watchlist.
Excluded users removed from watchlist definition
This event means that certain users in a department or directory group were who were previously excluded from a watchlist are now added to a watchlist.
External attributes change
This event means that an external user provisioning system updated a user's attributes, such as User Directory Sync or a SCIM provisioning system like Azure AD provisioning, Okta provisioning, or PingOne provisioning.
When a provisioning system triggers an event, the Username Code42 entry appears as the provisioning provider username credentials from Incydr (for example, "azure_1234@cloud.code42.com").
If multiple attributes for a user are changed as a result of a single provisioning action, then all the attribute changes appear in the same event. User attributes obtained from a provisioning system display in the User Profile. The changed attributes that can appear in this event type are:
- country
- division
- department
- employee_type
- locality
- manager_user_id
- region
- title
If user attributes are not populated correctly, see Provision user attributes to Incydr.
External reference change
This event means that a user's external reference information was changed. The External Reference field is used by administrators to add descriptive information to users, devices, or organizations in the environment, such as serial numbers, asset tags, employee IDs, help desk issue IDs, and the like. This information provides additional context for administrators and helps to integrate with external systems.
Federation created
This event means that a federation was created in Identity Management.
Federation deleted
This event means that a federation was deleted in Identity Management.
Federation metadata updated
This event means that the metadata for a federation was edited.
Federation updated
This event means that details of a federation were edited.
File download
This event means that a file was downloaded from Forensic Search or a case. The downloaded file's name, size, MD5 hash, and other information appears in the additional event details.
File download: IO error
When a file download from Forensic Search or a case was attempted, the file failed to download due to an I/O device error.
Forensic Search query
This event means that a Forensic Search query was performed in the Incydr console or a Forensic Search was run with the API. The details of the Forensic Search query are recorded in the Query Parameters.
Git repository added
This event means that a Git repository has been added to the list of trusted activity in data preferences.
Git repository changed
This event means that a Git repository has been changed in the list of trusted activity in data preferences.
Git repository deleted
This event means that a Git repository has been removed from the list of trusted activity in data preferences.
Groups added to watchlist definition
This event means that a directory group was added to a watchlist.
Groups removed from watchlist definition
This event means that a directory group was removed from a watchlist.
Identity provider assigned to org
This event means that an authentication provider was assigned to an organization.
Identity provider created
This event means that an authentication provider was created.
Identity provider deleted
This event means that an authentication provider was deleted.
Identity provider metadata updated
This event means that the metadata for an authentication provider was edited.
Identity provider removed from org
This event means that an authentication provider was removed from an organization.
Identity provider updated
This event means that details of an authentication provider were edited.
Included users added to watchlist definition
This event means that users were added to a watchlist individually.
Note that if a user is added because they are a member of a directory group or department, the User added to watchlist membership event occurs.
Included users removed from watchlist definition
This event means that users were removed from a watchlist individually.
Note that if a user is removed because they are a member of a directory group or department, the User removed from watchlist membership event occurs.
Incydr support user access disabled
This event means that support access to your environment was turned off, so Incydr support users (also known as Technical Support Engineers) no longer have permission to access your environment to troubleshoot or adjust settings.
Incydr support user access enabled
This event means that Incydr support users (also known as Technical Support Engineers) were granted support access to your environment to troubleshoot and adjust settings as needed.
Incydr support users can log in after they are given support access.
To find events performed by an Incydr support user, filter on the user type Incydr support user. The user information appears in the User type section of the event details. If the support user creates additional users, you can find them in the Audit Log by filtering on the user type Incydr support user and event type Add user.
IP address added
This event means that an IP address has been added to the list of trusted IP addresses in data preferences.
IP address changed
This event means that an IP address has been changed in the list of trusted IP addresses in data preferences.
IP address deleted
This event means that an IP address has been removed from the list of trusted IP addresses in data preferences.
Local auth only change
This event means that the local authentication method was changed for the user. Users with local authentication appear in the Local Users pane of the Authentication tab in Identity Management.
In the Updated local auth status field of the event details, a value of "true" indicates that the user is restricted to local (Incydr-based) authentication only, while a value of "false" indicates that the user is authenticated by SSO.
An empty value for fields in this event type may result from the initial intake of users from your environment into the Audit Log. See Troubleshooting.
Name change
This event means that a user's first name or last name was changed.
Path purged
This event means that the purge.path command was used to remove files or directories from backup archives.
Restore ended
This event means that restoration (download) of files to a device has completed.
The additional event details show the type of restore and other information about the restore, such as the owner of the device that received the restored files.
Restore started
This event means that restoration (download) of files to a device has started.
Compare the restore start and end times for the same restore ID to find how long a restore took. Depending on the kind of restore and the amount of file content restored, the length of time for a restore can vary widely.
Risk factor added
This event means that risk factors were added to a user in a watchlist.
Risk factor removed
This event means that risk factors were removed from a user in a watchlist.
Risk profile end date changed
This event means that the departure date of a user was changed in a user profile.
Risk profile notes changed
This event means that notes were changed in a user profile.
Risk profile start date changed
This event means that the start date was changed in a user profile.
Risk indicator changed
This event means that the severity value of a risk indicator was changed.
Risk indicator created
This event means that a risk indicator was added. This is a system action that occurs: 1) when Incydr creates a new risk indicator, or 2) the first time Incydr receives a file event after your initial deployment. You cannot create new risk settings on your own.
SCIM provisioner configuration updated
This event means that details of a SCIM provisioning provider were edited.
SCIM provisioner created
This event means that a SCIM provisioning provider was created.
SCIM provisioner credentials changed
This event means that the Provider Credentials were changed for the SCIM provisioning provider.
SCIM provisioner deleted
This event means that the SCIM provisioning provider was deleted.
Sharing permission removed
This event means that a cloud storage file's sharing permissions have been removed for a user.
Slack Workspace added
This event means that a Slack Workspace has been added to the list of trusted activity in data preferences.
Slack Workspace changed
This event means that a Slack Workspace has been changed in the list of trusted activity in data preferences.
Slack Workspace deleted
This event means that a Slack Workspace has been removed from the list of trusted activity in data preferences.
Temporary file access granted
This event means an analyst has requested temporary view access to a file in a cloud storage service monitored by one of our data connectors. File access is granted for 15 minutes.
Temporary file access revoked
This event means an analyst's temporary 15-minute view access period has expired for access to a file in a cloud storage service monitored by one of our data connectors.
URL added
This event means that a specific URL path has been added to the list of trusted activity in data preferences.
URL changed
This event means that a specific URL path has been changed in the list of trusted activity in data preferences.
URL deleted
This event means that a specific URL path has been removed from the list of trusted activity in data preferences.
User added to watchlist membership
Indicates a user was added to a watchlist. This event represents the system action of updating the watchlist membership. As a result, the Acting user is listed as the "Watchlist Background Service," and no IP address for the user is provided.
- If the change was manually initiated by an administrator, or initiated via an integration, another audit log event, such as Included users added to watchlist definition, Department added to watchlist definition, or Groups added to watchlist definition is also created around the same time, which includes more details about the acting user or integration.
- If the change was automatically initiated by a directory sync, this is the only audit log event listed.
User removed from watchlist membership
Indicates a user was removed from a watchlist. This event represents the system action of updating the watchlist membership. As a result, the Acting user is listed as the "Watchlist Background Service," and no IP address for the user is provided.
- If the change was manually initiated by an administrator, or initiated via an integration, another audit log event, such as Included users removed from watchlist definition, Department removed from watchlist definition, or Groups removed from watchlist definition is also created around the same time, which includes more details about the acting user or integrator.
- If the change was automatically initiated by a directory sync, this is the only audit log event listed.
User roles assigned
This event means that roles were assigned to a user. For a list of all available roles, see the Roles reference.
User roles revoked
This event means that roles were removed from a user.
Username change
This event means that a user's username was changed. The user's email address is also their Incydr username. Therefore, a change to a username also results in an Email change event for the user.
The Affected user field in the event details is empty in this type of event because the username value is shown in the Old value and New value fields. See Troubleshooting.
Users added to alert rule
This event means that users are added to an alert rule by the API, py42, or CLI. If users are added to an alert rule in the Incydr console, it triggers an Alert rule edited event.
Users removed from alert rule
This event means that users are removed from an alert rule by the API, py42, or CLI. If users are removed from an alert rule in the Incydr console, it triggers an Alert rule edited event.
Watchlist created
This event means that a watchlist was created.
Watchlist definition changed
This event means that some aspect of a watchlist changed.
Watchlist deleted
This event means that a watchlist was deleted.
Watchlist description changed
This event means that the description of a custom watchlist changed.
Watchlist name changed
This event means that the name of a custom watchlist changed.
Watchlist removed from alert rule
This event means a watchlist is no longer in an alert rule because it was deleted from the list of watchlists. If a watchlist is removed from an alert rule, it triggers an Alert rule edited event.
ZIP file downloaded
This event means that a ZIP file was downloaded to a device while restoring files to a ZIP file.
Troubleshooting
Empty values in fields
Empty values in Audit Log fields (shown as — or "unknown") may occur for a number of reasons:
-
Initial intake
In Add user and Local auth only change event types, an empty value for the Username (Code42), IP address (public), and User agent fields may result from the initial intake of users from your environment into the Audit Log. These fields are left blank because there is no acting user causing the event. -
Provisioning systems
When an event such as such as an External attributes change is triggered by a provisioning system, the User agent field is empty because there is no endpoint user agent involved in the transaction. If a provisioning system triggers an event, the Username Code42 entry appears as the provisioning provider username credentials from Incydr (for example, "azure_1234@cloud.code42.com"). -
Username changes
In Username change events, the Affected user field is empty because the username value is shown in the Old value and New value fields. -
User type
In event details the User type or Employee username fields may display an empty value or "Unknown". This can occur when a new user performs events and the events were recorded before the system could register the new user.
Export limit
The maximum number of events that can be exported from the Audit Log at once is 100,000. To work around this limitation, adjust your filters to reduce the number of events in any given export to be less than 100,000, then complete multiple exports to obtain the entire set of events.
Related topics
- Developer Portal: Audit Log APIs
- Audit Log event details
Comments
Please sign in to leave a comment.