Show TOC

Security Log StatisticsLocate this document in the navigation structure

The security log reflects the authentication history of users either across the cluster, or filtered according to domain, during a specified time period. These statistics allow you to diagnose and troubleshoot connection or authentication problems on a per-user basis. Security log monitoring is always enabled.

User security data falls into these categories:

Category Description
User The user name
Security Configuration The security configuration to which the device user belongs
Time The time at which the authentication request took place
Result The outcome of the authentication request: success or failure
Application Connection ID The application connection ID associated with the user
Package The package the user was attempting to access
Domain The domain the user was attempting to access