Administration Console: Monitoring Impersonation Protect Logs

Document created by user.oxriBaJeN4 Employee on May 4, 2017Last modified by user.oxriBaJeN4 Employee on May 19, 2017
Version 7Show Document
  • View in full screen mode

This guide describes how to access impersonation protection log files.

 

Applies To...

 

  • Administrators responsible for understanding why a potential impersonation protection attack has been triggered.

 

Displaying a Log File

 

To display a log files:

  1. Log in to the Administration Console.
  2. Click on the Administration menu item. A menu drop down is displayed.
  3. Click on the Monitoring | Impersonation Protection menu item.
    Authentication requests are excluded from the listing by default. Authenticated requests can be displayed by applying the "Authentication" filter. See the Administration Console: Searching / Filtering Records page for full details.
  4. Double click on a log file. The files' details are displayed in a panel that slides out from the right of the dialog.

    TTP IP Log Files
  5. Click on the X icon in the top right hand corner to return to the log file list.

 

See Also...

 

Attachments

    Outcomes