Security Log
This function is available only when the EAD module is installed.
Security logs record the security events occurred during a user's security authentication and access to the Internet.You can view the security events by querying the security logs.Analysis of the security logs helps you identify the risks in the network as basis for taking measures to improve network security.A security log includes information about the user causing the security event and details of the security event.
Functions
Precautions
- The query result does not contain security logs for cancelled services.
- The query result does not contain security logs for deleted users.
- The login time of a security log is the time when the access user passed identity authentication.
- The security log details page displays all the matching security logs generated during a one-time network access of the user.
- With the Action After timer and the Process After timer for real-time monitor configured, a user is recorded as isolated or kicked out in the security log immediately after the check result Isolate or Kick Out is obtained, but is not isolated or kicked out until the timers expire.