Authentication logs display information about authentication
events that occur when end users try to access network resources
for which access is controlled by
Authentication Policy rules.
You can use this information to help troubleshoot access issues
and to adjust your Authentication policy as needed. In conjunction
with correlation objects, you can also use Authentication logs to
identify suspicious activity on your network, such as brute force
attacks.