Yes. Next to our Audit Trail Logs, our Web Servers' and applications' logs are sufficiently detailed to support any necessary incident investigation.
In accordance with all relevant internal Policies and compliance requirements, all logs are retained for as long and in such detail as indicated (including successful/failed login attempts or changes to configuration settings or files), and are used in forensic analysis
whenever necessary.