Security Log: Security events like change of access location, un-authorized attempt to access a resource by a user and the action taken the system are listed in the security log. The security log displays a detailed list of security events with name of the user, the date & time, the platform and IP address from which the security event was triggered.