: Finding Logged Data Through Filtering
Focus
Focus

Finding Logged Data Through Filtering

Table of Contents

Finding Logged Data Through Filtering

The Event Log lists events generated by user actions and Next-Gen Trust Security operational activity. You can use filters to narrow the list and focus on events relevant to your task.
You can combine pre-built filters to exclude events that do not match your criteria. For example, you can enter a specific user name to find events associated with that user, or enter a keyword such as login to locate authentication-related events.

Filter Event Logs Using Pre-Built Filters

  1. Sign in to Next-Gen Trust Security.
  2. Click System Settings > Event Log.
  3. Click +, and then select one or more filters.
  4. For each filter, select one or more values from the dropdown.
  5. Click Apply Filter.

Common Filter Examples

The following table shows common GA-safe filtering scenarios.
Event log filter categoryCriteriaExample use
Criticality0, 1Review important events such as login failures or role changes.
DescriptionFree-form inputFind events related to a specific user name or IP address.
EventLogin FailedView recent failed login attempts.
EventUser Role ChangedReview changes to user roles.
EventCertificate IssuedSee when certificates were issued and to whom.
EventCertificate RetiredReview certificate retirement activity.
EventCertificate Validation FinishedCheck certificate validation results and status.
Event TypeAuthentication, Certificates, Certificate Authority, UsersFilter events by high-level functional area.
Timestamp7, 14, 30 daysView events that occurred within a recent time window.