The Secure Access History screen provides detailed logs about user/device access to internal and cloud apps.
The access control logs provide valuable information to analyze the security of your corporate devices and resources and to tailor your access control settings.
Tab |
Description |
---|---|
User Activity Logs |
Displays the rule enforcement details by user or device's app/URL access behavior Click a rule name to open the rule configuration screen and modify the rule as needed. Click the (>) icon to view current access details and risk control details. Use the drop-down lists and search field to filter logs about specific users. Click Switch to advanced to filter logs in the Search app using your selected query conditions. Note:
To search for data older than 30 days, you must use the Search app. |
Remediation Logs |
Displays the details about the remediation measures that are performed manually by the administrator or automatically through secure access rules Click a user or device name to view the user or device's current risk status, as well as the matched risk control rules, and take an action on the user or device for risk remediation. Click the (>) icon to view risk control details. |