A system designed to record and analyze event data from various OpenLM applications and customer systems
Introducing OpenLM Audit System
Gain insights into system activities and potential security concerns through an easily accessible and well-structured log of events.

Why do you need OpenLM Audit System?
The Audit System helps you simplify bug hunting and get access to error messages generated by the applications and customer system. It collects events from multiple sources, saves them into a single database, and presents them in one user interface.
Core features of OpenLM Audit System
Data security
- Encryption and anonymization: Encrypt log data during transmission and storage. Additionally, anonymize personal data within the logs to enhance privacy and meet data protection requirements.
- Log retention, archiving, and destruction: Define policies for log retention, archiving, and destruction based on regulatory and operational needs. OpenLM Audit also supports automated log rotation, archival to long-term storage, and secure deletion of expired logs.
Log analysis
- Search and filtering: Leverage advanced search and filtering capabilities to quickly locate specific log entries based on various criteria.
- Alerts and notifications: Configure alert rules based on specific events or thresholds. The system sends notifications to designated personnel in case of unusual or suspicious activities.
Log management
- Customizable logging: Customize logging parameters, specifying the events to log and the desired logging period.
- Audit trails: Access detailed audit trails of critical activities within OpenLM applications and customer systems. This includes user logins, data modifications, configuration changes, and administrative actions.
- Access logs: Get comprehensive access logs, including details such as login attempts, session durations, IP addresses, and authentication methods.
- Data modification logging: Track all data modifications, including the creation, deletion, or update of records or files. This data will include information about the user, the type of modifications performed, and the specific data affected.
- Security incident logging: Record security-related events like failed login attempts, data exports, and changes in user privileges to aid in threat detection and mitigation.
- Compliance logging (For cloud solutions only): Implement robust logging mechanisms to track and ensure compliance with regulations like GDPR, CCPA, and SOC-2.