Skip to main content

Understanding Team Admin Audit Trails in Swif

Updated this week

Swif is dedicated to ensuring transparency and accountability for all administrative actions. The Team Admin Audit Trail feature lets organizations monitor and review actions performed by team administrators, improving operational oversight, security, and compliance.

You can access audit data in two ways:

  1. A notification-style Audit Trail panel for quick reviews of recent activity (with Unread, All, and Trash tabs).

  2. The full Audit Trail page for deeper filtering and investigation.


What Is Tracked in the Audit Trails?

The audit trail records key administrative actions across multiple areas of your Swif tenant.

1. Device Management

Actions related to managed devices, such as:

  • Adding or removing devices

  • Assigning or unassigning devices to employees

  • Archiving or restoring device records

  • Locking or unlocking devices

  • Reassigning devices to new employees

  • Uploading receipts or invoices for devices

These events help you understand who changed device ownership, security state, or inventory details.

2. Team Management

Actions related to how teams are structured and managed, including:

  • Creating or deleting teams

  • Updating team configurations

  • Inviting or revoking invitations for team members

These records provide visibility into who can access which teams and when those changes were made.

3. Employee Records

Changes to employee profiles and access, such as:

  • Adding or removing employee profiles

  • Updating employee details

  • Sending role‑based invitations to employees

  • Inviting employees to enroll devices

This makes it easy to trace when employees were onboarded, offboarded, or had their access changed.

4. Organizational Settings

Tenant‑level configuration changes, including:

  • Modifying organizational configurations

  • Enabling or disabling specific features (for example, remote desktop, app tracking, or Swif IQ)

  • Managing tasks within to‑do lists

  • Updating the organizational address book

These logs are especially important for compliance and security reviews.


How to Access the Audit Trail

You can review audit data from both the notification panel and the full Audit Trail page.

A. Opening the Audit Trail Notification Panel

  1. Log in to your Swif Admin Panel.

  2. Click the Audit Trail icon in the left navigation or app header (depending on your layout).

  3. The Audit Trail notification panel opens, showing recent activity.

In the panel, you’ll see:

  • Tabs:

    • Unread (default) – actions you haven’t marked as read

    • All – both read and unread actions

    • Trash – actions you’ve moved to trash

  • Per‑admin unread counts

    • The unread count is user‑specific.

    • Example: if there are 5 total trails and:

      • Admin A has read 2, their unread count is 3

      • Admin B has read 1, their unread count is 4

  • Action buttons (on hover)

    • Unread tab: Mark as read, Trash

    • All tab: Mark as unread, Trash

    • Trash tab: Restore, Delete permanently

  • Empty states

    • When a tab has no records, you’ll see a dedicated empty‑state message (for Unread, All, or Trash).

  • Blue dot indicator

    • When you have unread audit trails, a blue dot appears on the Audit Trail icon, so admins can quickly see there’s new activity.

  • “View all” button

    • Click View all to navigate to the full Audit Trail page for deeper analysis.

Note: The All tab includes both read and unread items by design. New notifications appear in Unread and also in All.


B. Using the Full Audit Trail Page

For more detailed investigation, use the dedicated Audit Trail page:

  1. From the Audit Trail panel, click View all,
    or go to the Audit Logs / Audit Trail item in the left navigation (name may vary slightly depending on your tenant).

  2. On the full page, you can:

    • Search audit records

    • Filter by date range using the calendar

    • View detailed information for each action (who did what, where, and when)

The full page is designed for:

  • Reviewing longer histories

  • Applying filters and date ranges

  • Exporting or reporting (where available)

  • Supporting internal audits and investigations


Why Audit Trails Are Important

Audit trails are a core part of secure and compliant operations.

1. Compliance

  • Demonstrate that administrative actions follow your organization’s policies.

  • Support audits by providing a clear record of changes to devices, teams, and configuration.

2. Accountability

  • See which admin performed an action, and when.

  • Quickly identify the source of unexpected changes or configuration issues.

3. Transparency

  • Give security, IT, and compliance teams a shared, factual view of how the environment is being managed.

  • Build trust within your organization by making admin activity visible and reviewable.

4. Troubleshooting

  • Trace sequences of actions that led to an incident or user‑reported problem.

  • Validate whether a certain change actually occurred and by whom.


Role‑Based Access and Permissions

Access to audit data is role‑based:

  • Account Owners and appropriately permissioned admins can view audit trails.

  • Certain actions or views may be restricted for non‑owner roles, depending on your organization’s configuration.

This ensures that sensitive administrative history remains visible only to authorized users.


Summary

Swif’s Team Admin Audit Trail provides a clear, detailed record of administrator activity across devices, teams, employees, and organizational settings.

With:

  • A notification-style Audit Trail panel (Unread / All / Trash, with per‑admin unread counts and action buttons), and

  • A full Audit Trail page with search and date range filters,

Your organization gains strong visibility, better compliance posture, and faster troubleshooting capabilities.

If you need help reviewing or interpreting audit data, contact us at support@swif.ai or via the in‑app chat.


Did this answer your question?