Pulse Secure Access OverviewResources Applies To: Pulse Secure Access Overview Pulse Secure Access’s suite offers complete, end-to-end usability, visibility, and protection to enable remote, mobile and cloud access to hybrid IT services and applications from any device. Pulse Secure Access can be integrated with EventTracker using syslog. With the help of Pulse Secure Access knowledge pack, we can monitor the user URI requests, user login, and logout, user connection status on applications and trigger the alert whenever any user authentication failure is detected. EventTracker dashboard will help you to visualize the web activities on applications. It can even create the report which helps to collect user activities happening in the applications for a time interval. This will help you to review the different user activities. EventTracker CIM will help you to correlate the web requests from users, and user connection status with another log sources like web requests, user activities, user connection status, etc. EventTracker Knowledge Pack for Pulse Secure Access allows you to monitor the following components: - Compliance - User login and logout, Authentication failure and Authentication success. Operations - Access connection detail and Web connection activities. Previous Next Once Pulse Secure Access is configured to deliver logs to EventTracker, knowledge objects and reports can be configured in EventTracker. Some of the knowledge packs available in EventTracker are listed below. For more information, refer to the Integration Guide. Compliance Alerts Pulse Secure Access: Authentication failure – This alert will trigger whenever the user authentication fails. Reports Pulse Secure Access – Authentication success - This report provides information related to the user authentication success. Pulse Secure Access – Authentication failure - This report provides information related to user authentication failed. Pulse Secure Access – User login and logout – This report provides information related to user login and logout from user agents and IP address. Operations Reports Pulse Secure Access – Access connection detail – This report provides information related to user details like destination IP address, port number, company name, user name, how many bytes are received and access connection status. Pulse Secure Access – Web connection activities – This report provides information related to the user requesting detail like user IP address, URI, how many bytes are received and sent. Scope The configurations detailed in this guide are consistent with EventTracker version 9.x and later, and Pulse Secure Access and above version. Documentation For more information, refer to the Pulse Secure Access Integration guide.