User Authentication Reports
To search for and generate a report on who has authenticated on selected log sources during a specified time interval, use the User Authentication Real-Time Report.
In addition to setting the common report options in Preparing a Real-time Report, you can select optional filter operators in the generated report.
Optional filter operators can be sorted in ascending or descending order. Choose sort order using the drop-down menu. The default is to display only the Source Device, User, Source IP, Status, and Count.
For information on saving the generated report, see Formats for Saving a Generated Report.
| Option | Description |
|---|---|
| Source Device | Description of the device that sent these log messages |
| User | User who is making the inquiry |
| Source IP | IP address of the source host device |
| Source Domain | Domain of the source host device |
| Target User | User for whom the inquiry is made |
| Group | The name of the Policy group |
| Originating Host | The original host name where the event was originally created |
| Subsystem | The subsystem of the host |
| Originating IP | The original source IP address where the event was originally created |
| Event Name | Name of the event |
| Application Type | The type of application that generated the event |
| Status | Status of the connection |
| Type | Type of connection |
| Disconnect Reason | Reason the connection was terminated |
| Count | Number of connections |
Copyright © Cloud Software Group, Inc. All rights reserved.
