This section includes the following topics:
Using the DDoS attack log table
Using the event log table
Attack Log Backup
Login Events