- Table of Contents
-
- 02-Monitor
- 01-Attack defense statistics
- 02-Application audit logs
- 03-Blacklist logs
- 04-File filtering logs
- 05-TopN file filtering statistics
- 06-TopN file filtering trends
- 07-Flood attack logs
- 08-DNS cache information
- 09-Transparent DNS proxy statistics
- 10-Link load balancing statistics
- 11-Server load balancing statistics
- 12-URL visit trends
- 13-Operation logs
- 14-Report settings
- 15-Scanning attack logs
- 16-Session list
- 17-Single-packet attack logs
- 18-System logs
- 19-Threat logs
- 20-TopN threats
- 21-TopN threat trends
- 22-Traffic logs
- 23-TopN traffic
- 24-TopN traffic trends
- 25-URL filtering logs
- 26-TopN URL filtering statistics
- 27-TopN URL filtering trends
- 28-User information center
- 29-Security policy log
- 30-IPv4 online users
- 31-IPv6 online users
- 32-Load balancing logging
- 33-LB session information
- 34-MAC authentication online users
- Related Documents
-
Title | Size | Download |
---|---|---|
02-Application audit logs | 13.59 KB |
Application audit logs
Introduction
This page displays the Internet access behaviors of users. According to the users' Internet access behaviors, you can adjust the application audit and management policy to regulate the users' Internet access behaviors.
The application audit log displaying function takes effect after the logging function is enabled in the application audit policy. When packets match the policy, logs are output to the application audit logs page.
Click Details on the page to view details of the Internet access behaviors.
If a user does not belong to any user groups, the user group field in the application audit log displays the username.
If a user belongs to only one user group and the user group has been used by an audit policy, the user group field displays the user group name. If the user group is not used by any audit policy, the user group field displays the username.
If a user belongs to multiple user groups, the user group field displays the name of a user group randomly selected from the multiple user groups.