Documentation Index
Fetch the complete documentation index at: https://jam.dev/docs/llms.txt
Use this file to discover all available pages before exploring further.
Audit logs are available on the Enterprise plan only.
What gets logged
Audit logs capture three main categories of workspace activity:| Activity type | What’s logged |
|---|---|
| Access control changes | Changes to workspace, folder, and individual Jam permissions |
| Membership events | User invitations, removals, and role modifications |
| Settings changes | Data retention updates, AI feature toggles, and other workspace configuration changes |
How it works
Every logged event captures four pieces of information:- Who performed the action
- What was changed
- When it happened
- Context around the change
Key benefits
- Security oversight: Monitor access control changes and user permissions in real-time
- Team accountability: Track member invitations, role changes, and removals
- Configuration tracking: See when critical settings like data retention and AI features are modified
- Compliance support: Meet security audit and regulatory requirements