User Authentication Reports
To search for and generate a report on who has authenticated on selected log sources during a specified time interval, use the User Authentication Real-Time Report.
In addition to setting the common report options in Preparing a Real-time Report, you can select optional filter operators in the generated report.
Optional filter operators can be sorted in ascending or descending order. Choose sort order using the drop-down menu. The default is to display only the Source Device, User, Source IP, Status, and Count.
For information on saving the generated report, see Formats for Saving a Generated Report.
| Option | Description | 
|---|---|
| Source Device | Description of the device that sent these log messages | 
| User | User who is making the inquiry | 
| Source IP | IP address of the source host device | 
| Source Domain | Domain of the source host device | 
| Target User | User for whom the inquiry is made | 
| Group | The name of the Policy group | 
| Originating Host | The original host name where the event was originally created | 
| Subsystem | The subsystem of the host | 
| Originating IP | The original source IP address where the event was originally created | 
| Event Name | Name of the event | 
| Application Type | The type of application that generated the event | 
| Status | Status of the connection | 
| Type | Type of connection | 
| Disconnect Reason | Reason the connection was terminated | 
| Count | Number of connections | 
Copyright © Cloud Software Group, Inc. All rights reserved.
