1. Home
  2. Docs
  3. Security Compliance
  4. Comprehensive Security Co...
  5. Audit logs in Desk365

Audit logs in Desk365

Audit logs in Desk365 help you maintain transparency, security, and compliance when handling sensitive data. With audit logs, every action performed on encrypted ticket fields is recorded in one centralized place, making it easy to review who did what, when, and from where. 

This article explains what audit logs are, what activities are tracked, how to use the filters, and the benefits of using audit logs for compliance and internal reviews.

What are audit logs?

Audit logs record all activities related to protected personal information and encrypted ticket fields across Desk365. These logs provide a detailed and centralized audit trail to help organizations monitor access, changes, and configuration updates involving sensitive data. 

Each audit entry captures: 

  • What activity was performed 
  • Where the activity occurred (ticket fields, forms, roles, etc.) 
  • Which encrypted field was affected 
  • Who performed the action 
  • When the action was performed 
  • The access source (IP address) 
  • The related ticket number 

All encrypted ticket field related activities are available in one single audit log view, giving administrators complete visibility without switching between multiple pages. 

You can access the audit logs by navigating to Settings > Security > Audit Logs. 

audit-logs-in-desk365

Activities tracked in audit logs

As mentioned above, audit logs cover a wide range of encrypted ticket fields related actions across Desk365. Any activity that creates, modifies, exposes, restricts, or configures access to encrypted data is captured. 

1. Ticket fields

  • Creation of encrypted (PHI / ePHI / PII) ticket fields 
  • Editing encrypted field properties, including label, description, mandatory status, and tooltip 
  • Enabling or disabling encrypted ticket fields 
  • Deleting encrypted ticket fields 
  • Granting or revoking role-based access to the encrypted ticket field(s) 
  • Changing access levels for roles (View & Edit, View Only, or Hidden) 
  • Restricting or hiding encrypted fields from specific roles during configuration or updates 
encrypted-ticket-field-desk365

2. Ticket forms

  • Adding encrypted fields (such as Patient Name, Patient ID, Insurance Details) to ticket forms
  • Removing encrypted fields from ticket forms
  • Updating field requirement rules on ticket forms 
encrypted-ticket-field-added-to-ticket-form

3. Ticket details

  • Changes to ticket properties that involve encrypted fields
  • Updates made to encrypted data in ticket details 
encrypted-ticket-field-in-ticket-properties-desk365

4. Role permissions

Audit logs track all changes made within Settings > Admin > Roles that affect access to encrypted ticket fields and compliance features. This includes, enabling or disabling compliance access for a role, which controls whether users in that role can create, edit, and manage encrypted ticket fields 

role-access-for-encrypted-ticket-fields

5. Closure rules

  • Creating closure rules that reference encrypted fields
  • Modifications to ticket closure rules that involve encrypted fields
  • Deleting closure rules that include encrypted fields 

Each activity is logged along with the IP address of the user performing the action, adding an extra layer of accountability and traceability. 

encrypted-ticket-field-in-closure-rules

Using filters to review audit logs

Desk365 provides powerful filters so you can quickly narrow down audit entries and find exactly what you need. 

Filter by date 

You can filter audit logs by predefined ranges or select a custom period: 

  • Today
  • Yesterday
  • This week
  • Last 7 days
  • This month
  • Custom date range 

Filter by activity 

Choose where the activity occurred: 

  • Ticket fields
  • Ticket forms
  • Ticket details
  • Closure rules
  • Role permissions
  • Automation rules
  • Imports/Exports 

Filter by performed by 

Select one or more agents to see actions performed by specific users.

After selecting your filters, click ‘Apply’ to view the matching audit log entries instantly. 

How audit logs help your organization

  1. Compliance- Audit logs provide a clear and tamper-proof record of all encrypted ticket field related activities, helping you meet security compliance requirements. 
  2. Improved security & accountability-With user names and IP addresses recorded, administrators can easily trace changes back to the source and identify unauthorized or unexpected activity. 
  3. Faster internal audits-Instead of manually tracking changes, you can quickly filter and review logs during internal audits or compliance reviews. 
  4. Better change management-Understand when encrypted fields were created, modified, or exposed, and ensure that access permissions align with your organization’s policies. 
  5. Centralized visibility-All encrypted ticket field related activities are available in a single audit log view, eliminating confusion and reducing administrative effort. 

Best practices

  • Regularly review audit logs to monitor access and configuration changes 
  • Limit encrypted field access to only required roles 
  • Use date and agent filters during compliance reviews 
  • Retain audit logs as part of your security and compliance documentation 

Audit logs in Desk365 give you complete visibility into how protected information is handled across your helpdesk. With detailed activity tracking, powerful filters, and IP-level traceability, audit logs help you stay compliant, secure, and in control of sensitive data. 

Require additional assistance? Please reach out to us at help@desk365.io

How can we help?