‚ÄčAkamai MFA‚Äč provides you with different capabilities to collect and analyze the users' access logs.
Apart from the Authentication event reports offered by Enterprise Center, you can also extract and view the ‚ÄčAkamai MFA‚Äč security events data using the Unified Log Streamer (ULS) tool, common-line interface (CLI), or the Splunk app.

The following table presents available solutions to access and consume the ‚ÄčAkamai MFA‚Äč authentication events.

‚ÄčAkamai‚Äč Unified Log Streamer (ULS)Stream authentication events into any on-premises, cloud SIEM, or flat file for further processing and storage.
‚ÄčAkamai MFA‚Äč CLI (cli-mfa)Fetch authentication events by date range or near-real-time. This solution is perfect for an ad hoc investigation or integration with third-party tools supporting a command-line interface.
‚ÄčAkamai MFA‚Äč Splunk appCollect and monitor authentication events in your Splunk Enterprise environment.