User Authentication Reports
To search for and generate a report on who has authenticated on selected log sources during a specified time interval, use the User Authentication Real-Time Report.
In addition to setting the common report options in Preparing a Real-time Report, you can select optional filter operators in the generated report.
Optional filter operators can be sorted in ascending or descending order. Choose sort order using the list. The default is to display only the Source Device, User, Source IP, Status, and Count.
For information on saving the generated report, see Formats for Saving a Generated Report.
Option | Description |
---|---|
Source Device | Description of the device that sent these log messages |
User | User who is making the inquiry |
Source IP | IP address of the source host device |
Source Domain | Domain of the source host device |
Target User | User for whom the inquiry is made |
Group | The name of the Policy group |
Originating Host | The original host name where the event was originally created |
Subsystem | The subsystem of the host |
Originating IP | The original source IP address where the event was originally created |
Event Name | Name of the event |
Application Type | The type of application that generated the event |
Status | Status of the connection |
Type | Type of connection |
Disconnect Reason | Reason the connection was terminated |
Count | Number of connections |
Copyright © 2020. Cloud Software Group, Inc. All Rights Reserved.