- Table of Contents
-
- 03-Monitor
- 01-Blacklist logs
- 02-Single-packet attack logs
- 03-Scanning attack logs
- 04-Flood attack logs
- 05-Threat logs
- 06-URL filtering logs
- 07-File filtering logs
- 08-Security policy log
- 09-Application audit logs
- 10-System logs
- 11-Operation logs
- 12-Traffic logs
- 13-TopN traffic
- 14-TopN threats
- 15-TopN URL filtering statistics
- 16-TopN file filtering statistics
- 17-Attack defense statistics
- 18-Server load balancing statistics
- 19-Link load balancing statistics
- 20-Transparent DNS proxy statistics
- 21-TopN traffic trends
- 22-TopN threat trends
- 23-TopN URL filtering trends
- 24-TopN file filtering trends
- 25-URL visit trends
- 26-Report settings
- 27-Session list
- 28-LB session information
- 29-User information center
- 30-DNS cache information
- 31-IPv4 online users
- 32-IPv6 online users
- 33-MAC authentication online users
- 34-Load balancing logging
- Related Documents
-
Title | Size | Download |
---|---|---|
09-Application audit logs | 13.63 KB |
Application audit logs
Introduction
This page displays the Internet access behaviors of users. According to the users' Internet access behaviors, you can adjust the application audit and management policy to regulate the users' Internet access behaviors.
The application audit log displaying function takes effect after the logging function is enabled in the application audit policy. When packets match the policy, logs are output to the application audit logs page.
Click Details on the page to view details of the Internet access behaviors.
If a user does not belong to any user groups, the user group field in the application audit log displays the username.
If a user belongs to only one user group and the user group has been used by an audit policy, the user group field displays the user group name. If the user group is not used by any audit policy, the user group field displays the username.
If a user belongs to multiple user groups, the user group field displays the name of a user group randomly selected from the multiple user groups.