Behavior Models Cookbook - Authentication Models - Using Vendor-Specific Behavior Models Authentication
The authentication models reside under models/authentication, and consist of:
models/authentication
Authentication
Tracks authentication failures on the network.