The audit log keeps track of device user activity that might have security implications.
This activity includes user attempts (successful and unsuccessful) to do the following:
- Change user information
- Change device configuration
- Gain access to controlled areas (including the audit log)
- Update system software and attack protection filter packages
- Change filter settings
NoteFor TPS devices, users must have at least
Administrator access level to view, reset, and download the audit log. For IPS
devices, SuperUser access level is required.
|
| Heading | Description |
| ID | The ID of the alert in the log. |
| Time | The time of the alert added to the log. |
| Access Level | The access level of user causing the alert. Can include SMS for the system, SuperUser, and so on. |
| Interface | The interface used that generated the alert or event: WEB or SYS. |
| IP Address | The IP address of the system that generated the alert or event. |
| Component | The component affected by the alert or event, such as report, policy, and OAM. |
| Result | The result of the event, such as PASS for successful. |
| User | The user account causing the alert. |
| Message | The description of the alert. |
When you view the log, the user listed for the logged events might include SMS and
CLI. These
entries are entered by those applications into the audit log, as a SuperUser level
of
access.
