Monitoring & Audit

The Truvant agent runs in the background, enforcing policies and logging every command your AI agents execute.

Why this matters (LLM06:2025) Continuous monitoring ensures enforcement doesn't drift. The audit log provides the evidence trail that your AI agents are operating within policy — critical for compliance and incident response when addressing Excessive Agency.

Agent Monitoring

The Truvant enforcement agent is a lightweight background process that intercepts every command and MCP tool call your AI agents attempt to execute. It evaluates each action against your assigned policy role and either allows it, blocks it, or logs it (depending on whether the role is in Monitor or Enforce mode).

Install the agent

The agent is installed using a single command. Installation sets up the enforcement shim, registers the host with your organization, and starts the agent process.

# Install the agent and register this host with your organization
mcpctl install

The installer will prompt you to authenticate if you are not already logged in. It registers the host under your organization slug and applies the default policy role immediately.

Manage the agent

Use the following commands to control the agent lifecycle on any host.

# Check agent health and current policy mode
mcpctl agent status

# Start the agent if it is not running
mcpctl agent start

# Stop the agent (policy enforcement suspended until restarted)
mcpctl agent stop

# Restart the agent (applies after config or policy changes)
mcpctl agent restart

# Remove the agent and deregister this host from the organization
mcpctl agent uninstall

What the agent monitors

The agent observes the following categories of activity on each host:

Monitor vs Enforce mode

Every policy role operates in one of two modes. You can switch modes at any time from the Policy Management page or from the host detail view.

Mode Behavior
Monitor All commands are allowed to execute. Policy violations are logged and surfaced in the audit log and dashboard, but nothing is blocked. Use this mode when building or refining a policy role.
Enforce Commands that violate the policy are actively blocked before execution. The agent returns an error to the AI agent's process and records the blocked event in the audit log. Use this mode once you are confident the policy is correct.
Recommended: Monitor first, enforce second Always deploy a new policy role in Monitor mode for at least 48–72 hours before switching to Enforce. This gives the Policy Advisor enough behavioral data to generate accurate least-privilege suggestions, and ensures you do not accidentally block legitimate agent workflows when you flip the mode switch.

Audit Log

The Audit Log records every action evaluated by the enforcement agent across your entire fleet. Each entry captures the full context of a single agent action — what was attempted, what decision was made, and which rule was responsible.

Column Description
Timestamp UTC timestamp at which the command was evaluated by the enforcement shim on the originating host.
Hostname The machine where the action was attempted. Click to open the host detail view.
Binary The executable invoked by the agent (e.g., git, kubectl, terraform).
Command The full command and argument vector as evaluated. Sensitive argument values (tokens, passwords) are redacted.
Decision Allowed — the command was permitted. Blocked — the command was denied. Would Block — the command would have been blocked under Enforce mode, logged in Monitor mode.
Rule The specific policy rule that matched this command and produced the decision. Links to the rule in the role detail view.
Agent The AI agent process that initiated the command (e.g., Claude Desktop, Claude Code, a custom MCP client).
Severity The severity of the event: Info, Warning, Critical. Blocked commands and policy violations are elevated to Warning or Critical depending on the rule's declared risk level.

Filter the audit log using any combination of the following:

Audit log showing every AI agent command with timestamp, hostname, binary, command, decision, and matched rule columns
Audit log — every AI agent command logged with decision and matched rule

Alerts

Alerts surface events that require human review — either because an agent attempted something outside policy, or because a new plugin or MCP server has been detected and is awaiting approval.

Plugin Approvals

When the agent detects a new MCP server or Claude Code plugin that has not been previously analyzed or approved, it raises a Plugin Approval alert. The plugin is held in a Pending state: it can be used but is flagged in the audit log, and policy enforcement is applied at your configured risk threshold.

Each approval request shows:

Alerts

Policy-triggered alerts are raised when the enforcement agent observes a pattern that matches a configured alert rule, regardless of whether the command was blocked. Common alert triggers include:

Each alert can be acknowledged, escalated, or resolved from the Alerts page. Resolved alerts are retained in the log for audit purposes.

Alerts page showing plugin approval requests and policy-triggered alerts with severity, host, description, and action buttons
Alerts — review plugin approval requests and policy-triggered alerts

SIEM Integration

The enforcement agent writes structured signal files to a configurable local directory for consumption by SIEM agents such as Microsoft Defender for Endpoint (MDE), CrowdStrike, or any log forwarder that watches a file path.

For full SIEM configuration details, including the JSON schema, Sentinel integration steps, and supported forwarder configurations, see Integration › SIEM.