Views:
The audit log keeps track of device user activity that might have security implications. This activity includes user attempts (successful and unsuccessful) to do the following:
  • Change user information
  • Change device configuration
  • Gain access to controlled areas (including the audit log)
  • Update system software and attack protection filter packages
  • Change filter settings
Note
Note
For TPS devices, users must have at least Administrator access level to view, reset, and download the audit log. For IPS devices, SuperUser access level is required.
Heading Description
ID The ID of the alert in the log.
Time The time of the alert added to the log.
Access Level The access level of user causing the alert. Can include SMS for the system, SuperUser, and so on.
Interface The interface used that generated the alert or event: WEB or SYS.
IP Address The IP address of the system that generated the alert or event.
Component The component affected by the alert or event, such as report, policy, and OAM.
Result The result of the event, such as PASS for successful.
User The user account causing the alert.
Message The description of the alert.
When you view the log, the user listed for the logged events might include SMS and CLI. These entries are entered by those applications into the audit log, as a SuperUser level of access.