UAM records endpoint conflicts in Endpoint Conflict Audit. A conflict occurs when the new endpoint information (vendor, endpoint type, or OS) is different from an existing entry on the endpoint MAC address list. Make sure they have the same obtaining method: DHCP, HTTP User Agent, iNode, or MAC Address. In addition, when Allow Authentication is selected for the Endpoint Conflict Handling parameter, the new endpoint information overwrites the existing entry on the list. An endpoint conflict audit entry contains the MAC address, recording time, account name, login name, current endpoint information, last endpoint information, and last acquisition method. Such information helps operators to locate the user authentication failure reasons. If endpoint identification obtains different information through the MAC address for two consecutive times, it updates the endpoint information according to the most recent information, but it does not generate a conflict audit log for the second time.
Because a large volume of endpoint conflict audit logs might decrease the database performance, the system periodically clears the expired logs every day. The period for which the endpoint conflict audit logs are stored is determined by the Log Lifetime parameter in the service parameters.