Are you trying to track down authentication failures for RADIUS Auth, MAC Auth, PSK Auth?
If you are trying to track down auth failtures for RADIUS or NPS, start with testing your RADIUS Client relationship using the AAA Test Server (either via the CLI or GUI). If you have a time out, start by checking your psk between the two. If you get response, failed or successful, go from there.
Move over to the CLI and change logging level of security to debug:
(config) # logging level debugging security process authmgr
(config) # logging level debugging security subcat aaa
Attempt to connect to your wireless from a device. After the attempt, run the command show log security 50 and read through looking for something similar to:
--
Nov 20 20:14:16 :124003: <INFO> |authmgr| Authentication result=Authentication Successful(0), method=802.1x, server=Aercorone, user=24:77:03:08:53:d0
Nov 20 20:14:16 :124004: <DBUG> |authmgr| Auth server 'Aercorone' response=0
--
The response in bold (in this case 0) will tell you what the server's response is. In this case, 0 represents a success. If a 1 is returned, it represents a username/password mismatch. There are 6 different responses codes (see attached from the KB).
I have found that, when there is an error in the configuration of the Network Policy on the NPS (RADIUS) you can also receive response 1. At this point, start looking at the NPS event logs for errors.
Hope that helps a bit