Anthropic Compliance Activity Logs
The Anthropic Compliance API provides comprehensive activity logging for Enterprise organizations using Claude. These logs capture authentication events, chat and project interactions, file uploads, API key management, user administration, and SSO/SCIM directory sync actions. They help security and compliance teams maintain audit trails, meet regulatory requirements, and monitor user activity across Claude.ai, Claude Console, and the Claude API.
Ingest Methods
Setup the ingestion of this source using one of the following guides.
API Polling
Anthropic Compliance supports API polling to collect activity log events from your organization via the Compliance API.
Setup
- Go to Sources in RunReveal
- Click the Anthropic Compliance source tile
- Give it a name and click Connect Source
- Fill in the required field with your Compliance Access Key
Anthropic Compliance Access Key Configuration
To generate a Compliance Access Key for RunReveal:
Prerequisites:
- You must be the Primary Owner of an Enterprise organization
- The Compliance API must be enabled under Organization Settings → Data and Privacy
Enabling the Compliance API:
- Sign in to claude.ai as the Primary Owner
- Navigate to Organization Settings → Data and Privacy
- Click “Enable” under Compliance API
Creating the Compliance Access Key:
- In Organization Settings → Data and Privacy, find the Compliance access keys section
- Click “Create key”
- Provide a name (e.g., “RunReveal Integration”)
- Select the
read:compliance_activitiesscope - Important: Copy the key immediately — it will only be displayed once
Compliance API Required: The Compliance API is available to Enterprise plans only and must be explicitly enabled by the Primary Owner. If you do not see the Compliance access keys section, either the Compliance API has not been enabled or you are not the Primary Owner.
Console / API Users: If your organization uses Claude Console or the Claude API (rather than Claude.ai), use an Admin key instead of a Compliance Access Key. Admin keys automatically carry the read:compliance_activities scope when the Compliance API is enabled.
Anthropic Activity Types
The Anthropic Compliance integration collects a wide range of activity events from your organization. These events provide visibility into user behavior, platform operations, and security-relevant actions.
Event Categories Collected
Authentication
- SSO Login — SSO login initiated, succeeded, or failed
- Magic Link Login — Magic link login initiated, succeeded, or failed
- Social Login — Social provider login events
- Session Revoked — User session revocations
User & Organization Management
- User Invited / Joined — Org invitations sent, accepted, or rejected
- Account Deleted — Self-service account deletion
- Domain Capture — Domain verification and capture events
- Organization Icon — Organization icon updates and deletions
API & Admin Key Management
- API Key Created / Deleted / Updated — Scoped API key lifecycle events
- Admin API Key Created / Deleted / Updated — Admin key lifecycle events
Chat & Project Activity
- Chat Created / Viewed / Deleted — User chat lifecycle events
- Chat Settings Updated — Chat configuration changes
- Project Created / Viewed / Deleted — Project lifecycle events
- Project Document Created / Deleted — Project knowledge base changes
File Activity
- File Uploaded / Viewed / Deleted — File lifecycle events
Claude Code
- Code Review Config Updated — Claude Code Review configuration changes
- Repository Added / Removed / Updated — Claude Code Review repository changes
Administrative
- SSO Connection Activated / Deactivated / Deleted — SSO connection lifecycle
- SCIM Directory Sync — IdP-initiated user and group sync events
- Compliance API Accessed — Audit of Compliance API requests themselves
Event Data Structure
Each activity event includes:
- Activity ID and Type — Unique identifier and event category
- Timestamp — When the activity occurred (RFC 3339)
- Organization Context — Organization ID where the activity occurred
- Actor Information — Actor type, email, user ID, IP address, and user agent
- Event-specific Fields — Additional fields depending on the activity type
Data Collection
- Collection Method: API polling every 60 seconds
- Event Format: JSON with normalized fields for consistent querying
- Data Retention: Anthropic retains activity feed data for 6 years
- Delay: Activities are queryable after a short delay of up to 1 minute
Schema
The following columns are exposed for this source. RunReveal applies schema normalization across all sources, ensuring uniform field names and data types for cross-source queries and reusable detection logic.
Table: anthropic_logs (46 columns)
anthropic_logs (46 columns)| Column | Type |
|---|---|
workspaceID | String |
sourceID | String |
sourceType | String |
sourceTTL | UInt32 |
receivedAt | DateTime |
id | String |
eventTime | DateTime |
eventName | String |
eventID | String |
srcIP | String |
srcASCountryCode | String |
srcASNumber | UInt32 |
srcASOrganization | String |
srcCity | String |
srcConnectionType | String |
srcISP | String |
srcLatitude | Float64 |
srcLongitude | Float64 |
srcUserType | String |
dstIP | String |
dstASCountryCode | String |
dstASNumber | UInt32 |
dstASOrganization | String |
| Column | Type |
|---|---|
dstCity | String |
dstConnectionType | String |
dstISP | String |
dstLatitude | Float64 |
dstLongitude | Float64 |
dstUserType | String |
actor | Map(String, String) |
tags | Map(String, String) |
resources | Array(String) |
serviceName | String |
enrichments | Array(Tuple(data Map(String, String), name String, provider String, type String, value String)) |
readOnly | Bool |
rawLog | String |
activityID | String |
activityType | String |
organizationID | String |
actorType | String |
actorEmail | String |
actorUserID | String |
actorIPAddress | String |
actorUserAgent | String |
actorAPIKeyID | String |
actorAdminAPIKeyID | String |
Helpful Links
- Anthropic Compliance API Reference - Guide to enabling and accessing the Compliance API
- Anthropic Audit Logs - Overview of available audit log events