
In the Security Log, you can clearly see the detailed records of client access to applications, records the date and time of the client computer
access, user name, to access the application, the client computer name, client fingerprint, the client address and security policy responded to
the current visit, as shown below:
