Skip to main content

Documentation Index

Fetch the complete documentation index at: https://jam.dev/docs/llms.txt

Use this file to discover all available pages before exploring further.

Audit logs are available on the Enterprise plan only.

What gets logged

Audit logs capture three main categories of workspace activity:
Activity typeWhat’s logged
Access control changesChanges to workspace, folder, and individual Jam permissions
Membership eventsUser invitations, removals, and role modifications
Settings changesData retention updates, AI feature toggles, and other workspace configuration changes

How it works

Every logged event captures four pieces of information:
  • Who performed the action
  • What was changed
  • When it happened
  • Context around the change
You get a complete record of who did what and when, so you can spot unauthorized changes.

Key benefits

  • Security oversight: Monitor access control changes and user permissions in real-time
  • Team accountability: Track member invitations, role changes, and removals
  • Configuration tracking: See when critical settings like data retention and AI features are modified
  • Compliance support: Meet security audit and regulatory requirements

Enable audit logs

Contact us to enable audit logs for your workspace Contact sales