Full audit trail of every action in your vaults. Know who accessed what, when, and from where. Essential for team security and compliance.
Created, updated, deleted, viewed, shared, unshared — every meaningful action on vault items is logged with a timestamp, user, and item reference.
Each log entry records the IP address and browser user agent. Spot suspicious access patterns — like a login from an unfamiliar location or device.
Filter activity by vault, item, user, or action type. Paginated for performance. Quickly investigate any security concern or audit requirement.
Vault owners see activity across all their vaults. Know when a team member accessed a shared credential, or when a password was changed.