- Table of Contents
-
- 07-System
- 01-Hot backup
- 02-VRRP
- 03-Track
- 04-BFD
- 05-NQA
- 06-Basic log settings
- 07-Email server
- 08-Session log settings
- 09-NAT log settings
- 10-AFT log settings
- 11-Sandbox log settings
- 12-Threat log settings
- 13-Application audit log settings
- 14-NetShare log settings
- 15-URL filtering log settings
- 16-Data filtering log settings
- 17-Attack defense log settings
- 18-Reputation log settings
- 19-Bandwidth alarm logs
- 20-Configuration log settings
- 21-Security policy log
- 22-File filtering log settings
- 23-Terminal identification logging
- 24-Heartbeat log settings
- 25-WAF log settings
- 26-IP access logs
- 27-MAC access log
- 28-Load balancing logging
- 29-Bandwidth management logs
- 30-Context rate limit logging
- 31-Zero trust logs
- 32-Report settings
- 33-Session settings
- 34-Signature upgrade
- 35-Software upgrade
- 36-License management
- 37-IRF
- 38-IRF advanced settings
- 39-Contexts
- 40-vSystems
- 41-Administrators
- 42-Date and time
- 43-MAC address learning through a Layer 3 device
- 44-SNMP
- 45-Configuration management
- 46-Reboot
- 47-About
- 48-Fast Internet Access
- 49-Content moderation log settings
- 50-Drop statistics
- 51-License server
- Related Documents
-
Title | Size | Download |
---|---|---|
31-Zero trust logs | 12.77 KB |
Zero trust logs
Introduction
After you enable external authentication fast log output, the device will send log information in fast logs to the log host. The device supports outputting authentication logs, notification logs, and zero-trust policy logs. Authentication logs contain authentication results of trusted access controllers. Notification logs contain user offline and permission change information. Zero trust policy logs contain user information, asset information, and actions associated with a zero trusted policy.