Skip to main content

Logging features of key-value pair properties

Several key-value pair properties are placed in the structured data element of a syslog entry. These properties can also be logged in the header or message elements but are difficult to parse or extract.

Note

Log data is set to show based on the SecureAuth Threat Service subscription level, so you might not see all of these properties in the logs.

 

Threat descriptions

Threat types

To determine the type of threat detected, the following table lists the threat types that appear in realm log files.

Threat categories

To determine the category of threat detected, the following table lists the threat categories that appear in realm log files.