Skip to main content
Version: Enterprise (1.2.0)

Audit Logs

WebXTerm maintains comprehensive audit logs of all activities, helping you meet compliance requirements and maintain security visibility.

What's Logged

WebXTerm logs all significant activities across your organization:

Session & Command Events

Every command typed in a terminal session is automatically captured and stored with full context:

FieldDescription
MachineWhich machine the command was run on
UserWho executed the command
CommandThe full command text
TimestampExact time of execution
SuccessWhether the command exited successfully (exit code 0)
SourceWhich client was used — Web Terminal, Shell CLI, or VSCode Extension

Authentication Events

EventDetails Captured
Login SuccessUser, timestamp, IP address, authentication method
Login FailureUser (if known), timestamp, IP address, failure reason
LogoutUser, timestamp, session duration
Password ChangeUser, timestamp

Administrative Events

EventDetails Captured
Machine RegisteredUser, machine hostname, OS, IP address
Machine DeletedUser, machine
API Key RegeneratedUser, timestamp
Role ChangedAdmin, user, old role, new role

Viewing Audit Logs

Accessing Logs

  1. Navigate to Organization Settings → Audit Logs
  2. You'll see a chronological list of all events
  3. Use filters to narrow down the results

Filtering Options

Filter audit logs by:

  • Time Range: Last hour, day, week, month, or custom range
  • Event Type: Authentication, session, administrative
  • User: Specific user's activities
  • Machine: Events related to specific machines
  • Severity: Info, warning, critical

Search through logs using:

  • Keywords: Find specific text in log entries
  • User email: All activities by a user
  • IP address: All activities from an IP
  • Machine name: All activities on a machine

Log Details

Each command log entry contains:

{
"id": "68abc123def456",
"machine_id": "68xyz789abc012",
"machine_name": "production-web-01",
"user_id": "68usr789abc012",
"username": "johndoe",
"command": "sudo systemctl restart nginx",
"timestamp": "2026-02-06T14:30:22Z",
"success": true
}

Via the API:

# Get command logs for a machine (last 100)
curl -H "Authorization: Bearer YOUR_JWT_TOKEN" \
https://your-webxterm-instance.com/api/machines/{agent_id}/logs

See the Machines API for the full response format.

Coming Soon

Log retention policies, automated exports (S3/GCS), SIEM integrations (Splunk, Datadog, Elastic), and alert rules are on the roadmap and not yet available.

Best Practices

  1. Regular review: Schedule weekly audit log reviews
  2. Access control: Limit who can view audit logs
  3. Document incidents: When investigating, document findings from the audit log