This screen allows you to view and download the authentication logs of PCs.
This item is used to search the log.
1. Log Date
This item is used to narrow down the logs to be displayed in the list by date.
2. PC Name
This item is used to narrow down the logs displayed in the list by PC name. The entered string is searched by partial match.
If you select a device with the filter button, the search will be done by exact match.
3. Filter button
This button is used to select a PC name for refinement from the list of registered PCs. Clicking this button will display a modal for selecting a PC.
Displays a list of logs that match the search criteria. If you do not enter any search criteria, all logs will be searched.
Displayed when the filter button is clicked.
1. PC Name
Displays a list of registered PCs. Select the PC name you want to search.
2. Decision button
This button is used to determine the selected PC.
3. Cancel button
This is the back button without selecting a PC.
Lists the authentication logs of PCs that match the search criteria.
Displays the date and time of the log.
2. PC name
Displays the PC name.
3. Detail icon
This icon lists the details of the target authentication log.
4. Download icon
This icon is used to download the details of the target authentication log as a file.
Displays detailed information about the selected authentication log.
Displays the date and time of log writing.
2. Info level
Displays the information type.
Displays the operations that have been performed.
Displays the CredentialID used during FIDO authentication. (Operation during FIDO authentication only)
5. Location information
Displays the Location information obtained. (Only if you were able to obtain one)
6. IP address
IP address will be displayed. (Only if you were able to obtain one)
7. Cancel button
Return to the log list screen.