Slack Access Logs
Cloud & SaaSAuthentication & AccessSlackCloud Control Plane
Location
Slack workspace or org administration > Access LogsDescription
User access records showing sign-ins and session activity against Slack workspaces, including client, IP, time, and authentication-relevant context available through the admin surface.
Forensic Value
Access logs are the main Slack evidence source for account-takeover investigations. They help determine which users authenticated from unfamiliar infrastructure, when suspicious sessions began, and whether activity lines up with the broader compromise timeline from identity-provider or endpoint evidence.
Tools Required
Slack Admin ConsoleSlack Enterprise administration
Collection Commands
Slack Admin Console
Workspace or org settings > Access Logs > Filter by user and date range, then export or preserve the resulting sign-in evidence
Collection Constraints
- •Access-log availability varies by Slack plan and administrative scope, and it does not preserve full message or file activity.
- •Long-term history may require prompt export or an external archival workflow before records age out.
MITRE ATT&CK Techniques
T1078.004T1556