User Authentication Reports

To search for and generate a report on who has authenticated on selected log sources during a specified time interval, use the User Authentication Real-Time Report.

Menu path: Reports > Access Control > User Authentication

In addition to setting the common report options in Preparing a Real-time Report, you can select optional filter operators in the generated report.

Optional filter operators can be sorted in ascending or descending order. Choose sort order using the list. The default is to display only the Source Device, User, Source IP, Status, and Count.

For information on saving the generated report, see Formats for Saving a Generated Report.

User Authentication Report - Optional Filter Operators
Option Description
Source Device Description of the device that sent these log messages
User User who is making the inquiry
Source IP IP address of the source host device
Source Domain Domain of the source host device
Target User User for whom the inquiry is made
Group The name of the Policy group
Originating Host The original host name where the event was originally created
Subsystem The subsystem of the host
Originating IP The original source IP address where the event was originally created
Event Name Name of the event
Application Type The type of application that generated the event
Status Status of the connection
Type Type of connection
Disconnect Reason Reason the connection was terminated
Count Number of connections