User API Setting
If the user API is enabled, Threat Defender automatically tracks users and maps their usernames to IP addresses.
|/||The slider switch indicates whether the user API is enabled or disabled.|
|Note||Optional: Add a short description of the API settings.|
|Secret Key||Enter the password for user API connections. Click Show Password if you want to display the password in plaintext.|
|Do not log these usernames||To define logging exceptions, enter the usernames of users you do not want to log events for. You can enter multiple usernames separated by commas.|
|Do not log these IP addresses||To define logging exceptions, enter the IP addresses you do not want to log user events for. You can enter multiple IP addresses separated by commas.|
|Limit access to these IP addresses||Create a whitelist of IP addresses you want to log user events for. If this field contains IP addresses, Threat Defender will not log events for IP addresses that are not in this list. You can enter multiple IP addresses separated by commas.|
|Auto-expire learned IP addresses||Specify after how many days Threat Defender will forget the learned user/IP address mappings. If you set this value to
The buttons at the bottom of the screen allow you to store your changes (SAVE) or to discard them (CANCEL).