[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-01 (世界標準時間)。"],[],[],null,["# Audit logging\n\nThis page describes how audit logging works when securing the\nGoogle Cloud console and the Google Cloud APIs with Chrome Enterprise Premium.\n\nChrome Enterprise Premium by default logs all access requests to the\nGoogle Cloud console and the Google Cloud APIs that are denied because of\nsecurity policy violations to Cloud Logging. The audit log records are\nsecurely stored in Google infrastructure and available for future analysis. The\ncontent of the audit log is available on a per-organization basis in the\nGoogle Cloud console. The Chrome Enterprise Premium audit log is written into the \"Audited\nResource\" logging stream and is available in Cloud Logging.\n\nAudit log record content\n------------------------\n\nEach audit log record contains information which can be divided into two major\ncategories: the information about the original call, and information about\nsecurity policy violations. It is filled as follows:\n\nAccessing the audit log\n-----------------------\n\nThe content of the audit log is available on a per-organization basis in the\nGoogle Cloud console. The Chrome Enterprise Premium audit log is written into the\n\"Audited Resource\" logging stream and is available in Cloud Logging.\n\nWhat's next\n-----------\n\n- Learn more about [Cloud Audit Logs](/logging/docs/audit).\n- Learn more about [Enabling Cloud Audit Logs](/iap/docs/audit-log-howto) in Identity-Aware Proxy.\n- Learn more about [Audit Logging](/vpc-service-controls/docs/audit-logging) in VPC Service Controls."]]