The security log reflects the authentication history of users either across the cluster, or filtered according to domain, during a specified time period. These statistics allow you to diagnose and troubleshoot connection or authentication problems on a per-user basis.
User security data falls into these categories:
| Category | Description |
|---|---|
| User | The user name |
| Security Configuration | The security configuration to which the device user belongs |
| Time | The time at which the authentication request took place |
| Result | The outcome of the authentication request: success or failure |
| Device ID | The device ID associated with the user |
| Package | The package the user was attempting to access |
| Domain | The domain the user was attempting to access |