Authentications are an essential part of securing a perimeter. Analyzing all the authentications of an asset provides a comprehensive view of its security posture.
This feature introduces a dedicated view on all the authentication events that are related to the current asset.