Policy
Audit log management policy
Outlines the University’s approach to audit log management
Updated on 20 March 2026
Purpose
Audit log management includes generating, storing, and analysing log files to identify and respond to suspicious or anomalous events occurring within the enterprise. The Audit Log Management Policy provides the processes and procedures for ensuring logs are created and properly analysed. This policy applies to all Faculties and Directorates, and all assets connected to the University network.
Responsibility
Digital and Technology Services (DTS) is responsible for all audit log management functions. Specifically, administrators are responsible for configuring the correct devices to generate, store, and transmit logs. DTS is responsible for informing all users of their responsibilities in the use of any assets assigned to them, such as applying updates in a regular manner or restarting their systems. All University assets are required to comply with audit logging procedures.
It is the user’s responsibility to read and understand this policy and to conduct their activities in accordance with its terms. Users who find the policy statements to be unclear are encouraged to reach out to Digital and Technology Services (DTS) (https://www.dundee.ac.uk/it) to clarify ambiguities.
Exceptions
Exceptions to this policy must be made in writing and approved by your manager. This must contain:
- The reason for the request,
- Risk to the University of not following the written policy,
- Specific mitigations that will not be implemented,
- Technical and other difficulties, and
- Date of review.
All exceptions must be requested to DTS via the University Service Desk Self-Service Portal: https://help4u.dundee.ac.uk.
Policy
Generation
- An enterprise-wide strategy must be developed to establish and maintain an audit log process.
- This strategy must be documented.
- Documentation must be updated annually, or when significant changes have occurred.
- The contents of logs must be specified within the Secure Configuration Policy.
- Audit logging must be enabled on all enterprise assets.
- Audit logs must not be disabled on enterprise assets.
Transmission
- Procedures must be developed to move logs from enterprise assets to an audit log datastore.
- Access controls must be used to prevent audit logs from being modified in an unauthorised manner.
Storage
- Procedures must be developed to collect audit logs from enterprise assets.
- Sufficient storage space must be allocated for audit logs for the period required for analysis and retention.
- Sufficient space must be allocated to store audit logs on all enterprise assets.
- Sufficient space must be allocated to store audit logs on any centralised audit log datastore.
- Retention timeframes for audit logs should be in accordance with the enterprise data management process.
Review and Analysis
- All high severity events must be acted upon in accordance with the audit log management process.
Disposal
- All audit logs must be stored for a period specified by the audit log management process.
- Archived logs must be available for analysis.
- Disposal of audit logs should be in accordance with the enterprise data management process.
Review and Updates
This policy will be reviewed annually by the University and updated as necessary to reflect changes in technology, legislation, or institutional priorities.
Appendix: Definitions
University
The University of Dundee is a Scottish Registered Charity, No. SC01509 with its registered office at Tower Building, Nethergate, Dundee DD1 4HN
Staff
Staff are salaried members of the University or contracted individually by the University to provide a service.
Student
A person pursuing any course of study in the University.
Visitors
A visitor is anyone, not a member of staff or student, requiring access to University premises or services.
Information
The result of processing, manipulating, or organising data. Examples including but not limited to, text images, sounds, codes, computer programmes, software and databases.
Data
Information in raw form.
Confidentiality
Property that information is not made available or disclosed to unauthorized individuals, entities, or processes.
Integrity
Property of accuracy and completeness.
Availability
Property of being accessible and usable upon demand by an authorized entity.