
DescriptionToken
Result The result of the action, which can be one of the following values:
• SUCCESS
• FAILURE
• SOME_FAILURES
• CANCELED
• KILLED
A description of the action, which can be one of the following values:Action
• CANCELED• UNSETUP• LIST• ADD
• •••MODIFY LOGINDEPLOYENABLE
•• ••DISABLEDELETE LOGOUTSTART
••• •DONESAVEACCESS DOWNLOAD_START
••• KILLEDSETUPRUN
A description of the severity of the event, which can be one of the following values, listed in
descending order of importance:
Severity
• INFO
• NOTICE
• WARNING
• ERROR
• ALERT
• CRITICAL
The resource URI/name associated with the taskResource URI/name
The output message that appears in the audit logMessage
Example 1 Sample audit entries: user login and logout
2013-09-16 14:55:20.706 CST,Authentication,,,administrator,jrWI9ych,,,
SUCCESS,LOGIN,INFO,CREDENTIAL,,Authentication SUCCESS
.
.
.
2013-09-16 14:58:15.201 CST,Authentication,,,MISSING_UID,jrWI9ych,,,
SUCCESS,LOGOUT,INFO,CREDENTIAL,,TERMINATING SESSION
Download audit logs
The audit log shows the security administrator what security-related actions took place on the base
appliance.
You can download log files and other information for your authorized support representative to
use to diagnose and troubleshoot an appliance.
Prerequisites
• Minimum required privileges: Infrastructure administrator
Procedure 1 Downloading audit logs
1. From the Settings screen, select Actions→Download audit logs.
38 Support and other resources
Komentarze do niniejszej Instrukcji