Your logs are automatically-generated
and provide an audit trail for system, configuration, and network
events. Network logs record all events where Prisma Access acts
on your network traffic. For example, entries are recorded when
Prisma Access blocks traffic based on a security rule, grants access
to a user based on an authentication rule, or shapes traffic based
on a QoS rule.