All Products
Search
Document Center

Secure Access Service Edge:log audit

Last Updated:Mar 31, 2026

Log audit gives security teams a centralized view of access events, endpoint activity, sensitive file transfers, and administrator actions across the SASE environment. Use these logs to investigate security incidents, verify policy enforcement, and support compliance reviews.

Private access audit

The Private Access Audit tab records events evaluated against your internal access policies — including both allowed and denied access attempts.

Regular logs

When an internal access policy is configured and enabled, SASE evaluates each access event against the policy and records the result on the Private Access Audit > Regular Logs page.

View log details

In the Actions column of a log entry, click Details to view the policy hit details, basic information, access details, and endpoint details for that event.

View a user's device, application, and O&M exception summary

Click a username to open the log summary page for that user.

Web application access logs

On the Private Access Audit > Web Application Access Logs tab, view access logs for events that triggered access hardening for web apps. Access hardening includes:

  • Security checks: Detects the Host request header to prevent malicious bypasses

  • Access tracing: Adds information such as usernames to the HTTP request header for tracing

For information about configuring access hardening, see Add an office application to SASE.

Internet access audit

On the Internet Access Audit tab, view Website Access Records for company employees.

Terminal management

On the Terminal Management tab, view logs generated by employees using the SASE app. The tab includes the following log sub-types:

Log sub-typeWhat it records
Logon and Logoff LogsWhen employees log on to or log off from the SASE app
Over-quota Registration Application LogsRegistration requests that exceed the allowed device quota
Uninstallation Application LogsRequests to uninstall the SASE app from a device
Terminal LogsGeneral endpoint activity logs
Software ApplicationSoftware usage on managed endpoints
Unauthorized Software DiscoverySoftware detected on endpoints that violates policy

For details on managing endpoint registrations, see Configure and approve endpoint registration information. For software management, see Software management.

Sensitive file detection

On the Sensitive File Detection tab, view logs of sensitive files sent by company employees. For details on how detection policies work, see Secure data by detecting outgoing files.

Analyze user behavior with AI

For any sensitive file detection log, use the built-in AI analysis to evaluate user behavior across multiple dimensions: outgoing screenshots, screenshot content recognition, sensitive information determination, user action and intent analysis, and data breach risk assessment.

  1. In the AI Analysis column of a log entry, click the analysis icon.

  2. In the Intelligent Behavior Analysis panel, review the analysis results.

View sensitive file detection details

  1. In the Actions column of a log entry, click Details.

  2. In the Details panel, review the following fields:

FieldDescription
Data FlowThe path the file took from source to destination
Key InformationSummary of the most relevant details for the event
Sensitive MessageThe sensitive content identified in the file
Screenshot EvidenceScreenshots captured at the time of the event
Hit PolicyThe sensitive file detection policy that was triggered
Office TerminalThe endpoint device from which the file was sent
Outbound Transfer ChannelThe channel used to transfer the file
Account InformationThe user account associated with the event
image

Dynamic decision-making logs

On the Dynamic Decision-making Logs tab, view disposal and recovery operation logs generated by dynamic decisions for company employees.

  1. Log on to the SASE console.

  2. In the navigation pane, go to Log Analysis > Log Audit.

  3. Click the Dynamic Decision-making Logs tab. Filter the log list by Time, Restoration Method, or User.

  4. Select a sub-tab to view the specific log type:

    Sub-tabFields shown
    Handling LogsLog generation time, User, Device, Hit Policy, Action
    Restoration LogsLog generation time, User, Device, Hit Policy, Restoration Method
  5. In the Actions column, click View Handling Process to open the Handling Process page, where you can review the full disposal and recovery timeline. For details, see View the disposal flow.

Administrator operation logs

On the Administrator Operation Logs tab, view a complete record of configuration and management actions performed by administrators. Each log entry includes:

FieldDescription
Operation TimeWhen the operation was performed
Account IDThe administrator account that performed the operation
Operation SourceWhere the operation originated
Operation FeatureThe SASE feature that was operated on
Operation PageThe console page where the operation was performed
Operation TypeThe type of action taken
image