Security statistics reflect security activity for a specific monitored user. Security statistics enable you to monitor security authentication results.
Security Log Statistics
The security log reflects the authentication history of users either across the cluster, or filtered according to domain, during a specified time period. These statistics allow you to diagnose and troubleshoot connection or authentication problems on a per-user basis. Security log monitoring is always enabled.