LogoThreatmatic
Devices

Audit device activity

Review logs and events for enrolled endpoints

Audit device activity

Threatmatic logs all network flows, policy decisions, application events, and identity verifications for every enrolled device. Use the audit trail to investigate incidents, verify policy enforcement, and meet compliance requirements.

Steps

Open Device Logs

  1. Go to Devices
  2. Click on a device name
  3. Select the Activity tab

Understand the event types

Event typeDescription
Flow AllowedTraffic permitted by policy
Flow BlockedTraffic denied by policy
Policy AppliedA policy change was pushed and applied
App DetectedA new application was observed
App BlockedAn executable was blocked by policy
Identity VerifiedUser or application identity was confirmed
Agent ConnectedAgent established contact with the control plane
Agent DisconnectedAgent lost contact (with timestamp and reason)

Use the filter bar to narrow results by:

  • Time range — last 1h, 24h, 7d, or custom
  • Event type — filter to specific event categories
  • Source / Destination — IP, hostname, or application label
  • Policy — see all events triggered by a specific policy

Export logs

  1. Apply your desired filters
  2. Click Export
  3. Choose CSV or JSON

Logs can also be streamed to your SIEM via the Threatmatic webhook or syslog integration.

To investigate a specific incident, set the time range to the window in question and filter by the affected device or user — then trace flows from Identity Verified through to Flow Allowed or Flow Blocked.

Organization-wide audit log

To view activity across all devices:

  1. Go to Organization → Audit Log
  2. Apply filters as needed

The organization audit log also includes admin actions (policy changes, user invites, configuration changes).

Next steps

How is this guide?

Last updated on

On this page