Overview
Device and user authentication events are some of the most common events occurring on a network and are also frequent indicators of attacks, ranging from brute force attacks to credential theft and malicious insiders. Both failed logins as well as successful logins can be signs of malicious activity depending on their characteristics. With the Authentication Content Pack, you can determine which login events are legitimate and which ones are not welcome.
Download Content Pack
Registered ServicePortal users can log in to access the Knowledge Center for further documentation or to download the content pack file manually.