- 25 Jul 2025
- 2 Minutes to read
- PDF
Audit Logs
- Updated on 25 Jul 2025
- 2 Minutes to read
- PDF
Red Canary records audit logs when a number of actions are taken by both users and the platform. The list of activities resulting in audit logs is continually growing and includes events such as the following:
Authentication token usage
Automation trigger and playbook execution
Canary exporter key generation
Email preparation and sending
Endpoint live response actions
Login success and failure
Multi-factor authentication enabling/disabling
User invitations
User role changes
Only users with the Admin role can view audit logs.
View Audit Logs
To view audit logs, click your user icon at the top right of your Red Canary, then click Audit Logs.
Filter Audit Logs
You can filter your audit logs by attribute, and then download a CSV of the results.
Enter attributes in the Audit Log filter bar, and then press Enter.
Click to download a CSV of filtered logs.
Supported Filter Attributes
Attribute | Description | Example |
Creation time | The date and time the audit log was created. |
|
Action | The audit log action type. You can search for multiple actions at once by separating them with a vertical bar ( |
|
User | The user who executed an action. |
|
Dates are specified using from..to
syntax, where from
and to
are date-times or ISO 8601 dates. You can omit either from
or to
to filter for unbounded times.
Supported Filter Action Types
Category | Events |
---|---|
Authentication |
|
Automate |
|
Integrations |
|
Notifications |
|
Security |
|
User Management |
|
Others |
|
Trigger Automation Playbooks
You can use automation playbooks to trigger playbooks when an audit log is created.
From the navigation menu, click Automation.
Click Configure new trigger and select When an Audit Log is created.
Click Add condition and configure the trigger to match the desired audit log type.
Associate one or more playbooks to the trigger.
Learn more about taking action with playbooks and actions.
Support for EDR/EPP Audit Logs
Red Canary collects and records audit logs from certain Endpoint Detection and Response (EDR)/Endpoint Protection Platform (EPP) platforms so you can take advantage of Red Canary’s API and automation features.
Carbon Black Response EDR and CrowdStrike Falcon support EPP/EDR audit log collection.
Integration | Audit Log Support |
---|---|
Carbon Black Response EDR | For Carbon Black Response EDR deployments hosted by Red Canary, the contents of the Live Response log and Endpoint Isolation log are analyzed and mapped to the endpoints and users as much as possible. The action for each audit log will be...
|
CrowdStrike Falcon | CrowdStrike Falcon processes and maps raw events labeled Event_UserActivityAuditEvent and Event_AuthActivityAuditEvent to endpoints and users in Red Canary. The action for each audit log is based on the OperationName of the raw CrowdStrike event. |