Slack Audit Logs

Cloud & SaaSCommunicationSlackCloud Control PlaneSIEM / Log Aggregator

Location

Slack Admin > Audit Logs or Slack Audit Logs API

Description

Administrative audit events for Slack covering workspace and organization changes, app installations, channel governance actions, user and guest management, retention changes, and selected security-relevant administrative activity.

Forensic Value

Slack Audit Logs are essential for tracing tenant-level changes, privileged administrative actions, and app installation events that may expand data exposure or weaken controls. They also provide high-value context in insider threat and collaboration-platform compromise cases.

Tools Required

Slack Admin ConsoleSlack Audit Logs APISIEM

Collection Commands

Slack Audit Logs API

GET /audit/v1/logs?oldest=1709251200&latest=1709856000 with a Slack audit token, then preserve the paginated JSON responses

Slack Admin Console

Security > Audit Logs > Filter by actor, action, and date range > Export the resulting evidence set

Collection Constraints

  • Slack audit logging availability depends on Slack plan and organization features; not every workspace has the same audit surface.
  • Audit logs record administrative activity and governance actions, not the full content of messages or files by themselves.

MITRE ATT&CK Techniques

T1098T1078.004T1528

Related Blockers