7.7 Validating Run-time Event Logging Configuration

You can use the following procedure to test your run-time event logging configuration.

Before you begin:

To validate run-time event logging configuration:

  1. In a browser, enter the URL to a protected resource and sign in using an invalid credential.
  2. Sign in again using the proper credential.
  3. On the physical server, verify all the logs appear in:
  4. Open the log file and look for the last entries to confirm authentication failure and success, respectively.