The security log reflects the authentication history of users either across the cluster, or filtered according to domain, during a specified time period. These statistics allow you to diagnose and troubleshoot connection or authentication problems on a per-user basis.
User security data falls into these categories:
| Category | Description | 
|---|---|
| User | The user name | 
| Security Configuration | The security configuration to which the device user belongs | 
| Time | The time at which the authentication request took place | 
| Result | The outcome of the authentication request: success or failure | 
| Device ID | The device ID associated with the user | 
| Package | The package the user was attempting to access | 
| Domain | The domain the user was attempting to access |