Administration Console: Monitoring Impersonation Protect Logs

Document created by user.oxriBaJeN4 Employee on May 4, 2017Last modified by user.oxriBaJeN4 Employee on May 19, 2017
Version 7Show Document
  • View in full screen mode

This guide describes how to access impersonation protection log files.


Applies To...


  • Administrators responsible for understanding why a potential impersonation protection attack has been triggered.


Displaying a Log File


To display a log files:

  1. Log in to the Administration Console.
  2. Click on the Administration menu item. A menu drop down is displayed.
  3. Click on the Monitoring | Impersonation Protection menu item.
    Authentication requests are excluded from the listing by default. Authenticated requests can be displayed by applying the "Authentication" filter. See the Administration Console: Searching / Filtering Records page for full details.
  4. Double click on a log file. The files' details are displayed in a panel that slides out from the right of the dialog.

    TTP IP Log Files
  5. Click on the X icon in the top right hand corner to return to the log file list.


See Also...