User Authentication Reports
To search for and generate a report on who has authenticated on selected log sources during a specified time interval, use the User Authentication Real-Time Report.
In addition to setting the common report options in Preparing a Real-time Report, you can select optional filter operators in the generated report.
Optional filter operators can be sorted in ascending or descending order. Choose sort order using the drop-down menu. The default is to display only the Source Device, User, Source IP, Status, and Count.
For information on saving the generated report, see Formats for Saving a Generated Report.
Option | Description |
---|---|
Source Device | Description of the device that sent these log messages |
User | User who is making the inquiry |
Source IP | IP address of the source host device |
Source Domain | Domain of the source host device |
Target User | User for whom the inquiry is made |
Group | The name of the Policy group |
Originating Host | The original host name where the event was originally created |
Subsystem | The subsystem of the host |
Originating IP | The original source IP address where the event was originally created |
Event Name | Name of the event |
Application Type | The type of application that generated the event |
Status | Status of the connection |
Type | Type of connection |
Disconnect Reason | Reason the connection was terminated |
Count | Number of connections |
Copyright © Cloud Software Group, Inc. All rights reserved.