Want to learn more about the best ways to use syslogs
to associate users with authentication events that originate from
many different types of sources?
Next-gen firewalls can parse Syslog log messages
to obtain IP address-to-username mappings. You can use authentication
events from existing network services and devices such as third-party VPN
solution, Network Access Control solution (NACs), or Security Information
and Event Management (SIEMs) using Syslog messages. To keep user
mappings current, you can also configure to parse syslog messages
for logout events so that the firewall automatically deletes outdated
mappings.