Skip to content

Audit Trails

Every meaningful action on AgenFleet is recorded in an audit trail. This gives you visibility into what your agents did, when they did it, how much it cost, and who configured them — essential for operational oversight, compliance reporting, and incident investigation.


Every agent action is recorded:

EventWhat’s captured
Session createdTimestamp, session ID, initiating user or job
Message sentTimestamp, session ID, token count (not message content by default)
Tool calledTool name, timestamp, success/failure, duration
Cron job executedJob ID, run timestamp, tokens used, delivery status
Cron job delivery failedJob ID, timestamp, failure reason

All changes to agent configuration are logged:

EventWhat’s captured
Agent createdTimestamp, creator, initial config snapshot
Agent config updatedTimestamp, actor, field changed, old value, new value
SOUL file updatedTimestamp, actor, file hash before/after
Cron job created/modified/deletedTimestamp, actor, full job definition
Tool access changedTimestamp, actor, tool name, granted/revoked
Budget limit changedTimestamp, actor, old limit, new limit
EventWhat’s captured
User loginTimestamp, user ID, IP address, success/failure
User invitedTimestamp, inviting actor, invited email, role assigned
Role changedTimestamp, actor, target user, old role, new role
User removedTimestamp, actor, removed user

The activity audit log is available in two places:

Open any agent → Activity tab. This shows all activity for that specific agent, filterable by:

  • Event type (session, cron, tool call, config change)
  • Date range
  • Status (success / failure)

Go to Settings → Audit Log for the full cross-agent audit trail for your workspace. Filterable by:

  • Actor (specific user or “system” for automated events)
  • Agent
  • Event type
  • Date range

The tenant-level log is only accessible to Owners and Admins.


Audit log records cannot be modified or deleted through the portal UI or the API. Each log entry includes:

  • A monotonically increasing sequence ID
  • Timestamp with microsecond precision
  • The actor (user ID or “system”) responsible for the event

Audit logs can be exported as CSV or JSON from Settings → Audit Log → Export.

Export options:

  • Full log (all events, all agents)
  • Filtered export (specific agent, date range, or event type)
  • Max 90 days per export request

For automated log export (e.g., feeding into a SIEM), use the Metrics API which exposes the activity log as a queryable endpoint.


Log typeRetention
Activity log (agent events)1 year
Configuration change log2 years
Authentication log1 year
Cron job run history1 year
Session history (message content)Until archived by user, then 90 days

After retention periods expire, records are permanently deleted and cannot be recovered.


Access review — export the authentication log quarterly and verify that only authorized personnel have accessed the system. Cross-reference against your HR system for terminated employees.

Change management — export the configuration change log for a period and verify all changes were authorized. The actor field shows who made each change.

Incident investigation — when investigating unexpected agent behavior, filter the activity log by agent and time window. You can trace every tool call, session creation, and configuration change during the incident window.

Data subject requests (GDPR) — use the session history and activity log to identify all data processed for a specific user or subject, and provide this as part of a subject access request.

AgenFleet can provide:

  • Architecture diagrams showing data flows and isolation boundaries
  • Completed security questionnaires (for Enterprise plans)
  • Data processing agreement (DPA) for GDPR compliance
  • Penetration test summaries (upon NDA)

Contact security@agenfleet.ai for compliance documentation requests.