You should familiarize yourself with a few different configurations that involve user authentication of traffic through the security appliance but also administrative access to the security appliance.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results