Examples of login types are SAML, Exchange, and Re-auth. LOGIN TYPE-Lists the login types and the total number of suspicious logins that were associated with each login type during the chosen timeframe.USERS-Lists the users and the total number of suspicious logins that were associated with each user during the chosen timeframe.
#DATA LIST BY USER LOGIN PHP MAKER OFFLINE#
CHALLENGE TYPE-Lists the challenge types and the total number of failed logins that were associated with each challenge type in the chosen timeframe. Examples of challenge types are Google prompt, Password, Offline OTP, Login location, and Security key.LOGIN TYPE-Lists the login types and the total number of failed logins that were associated with each login type during the chosen timeframe.USERS-Lists the users and the total number of failed logins that were associated with each user during the chosen timeframe.Different data is displayed in each tab, depending on the type of chart at the top of the page. The table at the bottom of the page displays three different tabs: USERS, LOGIN TYPE, and CHALLENGE TYPE. To view more details about user login attempts on specific dates, click any data point in the graph. Then, to change the analysis, at the top right of the chart, use the menu to change the overlay line. You’ll see an overlay on the chart to show the 10th, 50th, and 90th percentile of historical data (180 days for most data and 30 days for Gmail data). To compare the current data to historical data, in the top right, from the Statistical analysis menu, select Percentile (not available for all Security dashboard charts). To generate a spreadsheet with the graph’s data, click Export Sheet A spreadsheet corresponding to the data in the graph will be generated and saved to your My Drive folder. Click Apply after you set the date range. Suspicious login attempts are also Successful.Ĭustomize the report to view data from Today, Yesterday, This week, Last week, This month, Last month, or Days ago (up to 180 days) or enter a Start date and End date.A login attempt is considered suspicious if it had unusual characteristics-for example if the user logged in from an unfamiliar IP address.Suspicious-Include only suspicious login attempts. Successful-Include only successful login attempts. Login outcome: All, Failed, Successful, Suspiciousįailed-Include only failed login attempts. Using the drop-down menus above the graph, you can customize the graph: Filter
This graph displays the number of user login attempts over time. In the bottom-right corner of the User login attempts panel, click View Report.To see Security on the Home page, you might have to click More controls at the bottom.
From the Admin console Home page, go to Security Dashboard.