Security Events
- To see data in the Security Events section, the following must be installed on the end user's machine:
- Cisco Secure Client. For information, see Download Cisco Secure Client.
- ThousandEyes. For information, see Set Up Experience Insights.
- Zero Trust Access. For information, see Add a Client-Based Zero Trust Access Posture Profile.
The section displays the allowed and blocked events that occurred when a user's device attempted to access an organizational resource using Zero Trust Access.

The User-associated rules section displays the Zero Trust Access security rules that were triggered by the user's device in a specified period, sorted by descending order of frequency.
- When an event is both allowed and blocked, its user-associated rule displays as two separate entries in the table.
The Blocked and Allowed Events graphs display the combined total of blocked and allowed Zero Trust Access events for the user's device within the specified time period.
- To see a comprehensive view of events that are associated with the user, click View all .
The Security event details section shows information for the security event that was triggered for the user's device most recent attempt to access an organizational resource using Zero Trust Access. For more information, see Client-Based Zero Trust Access.
