McAfee EPOCDE-AA-BA Product Guide - Page 116

The Threat Event Log, Common event format

Page 116 highlights

11 116 Other important server information ePolicy Orchestrator Log Files • The letter "L" means "last" in the Day of Week or Day of Month fields. For example, "0 15 10 ? * 6L" means the last Friday of every month at 10:15 am. • The letter "W" means "weekday". So, if you created a Day of Month as "15W", this means the weekday closest to the 15th of the month. Also, you can specify "LW", which means the last weekday of the month. • The pound character "#" identifies the "Nth" day of the month. For example, using "6#3" in the Day of Week field is the third Friday of every month, "2#1" is the first Monday, and "4#5" is the fifth Wednesday. If the month does not have a fifth Wednesday, the task does not run. The Threat Event Log Use the Threat Event Log to quickly view and sort through events in the database. The log can be purged only by age. You can choose which columns are displayed in the sortable table. You can choose from a variety of event data to use as columns. Depending on which products you are managing, you can also take certain actions on the events. Actions are available in the Actions menu at the bottom of the page. Common event format Most managed products now use a common event format. The fields of this format can be used as columns in the Threat Event Log. These include: • Action Taken - Action that was taken by the product in response to the threat. • IPv4 Address - IPv4 address of the system which sent the event. • Agent GUID - Unique identifier of the agent that forwarded the event. • IPv6 Address - IPv6 address of the system which sent the event. • DAT Version - DAT version on the system that sent the event. • MAC Address - MAC address of the system which sent the event. • Detecting Product Host Name - Name of the system hosting the detecting product. • Network Protocol - Threat target protocol for network-homed threat classes. • Detecting Product ID - ID of the detecting product. • Port Number - Threat target port for network-homed threat classes. • Detecting Product IPv4 Address - IPv4 address of the system hosting the detecting product (if applicable). • Process Name - Target process name (if applicable). • Detecting Product IPv6 Address - IPv6 address of the system hosting the detecting product (if applicable). • Server ID - Server ID which sent the event. • Detecting Product MAC Address - MAC address of the system hosting the detecting product. • Threat Name - Name of the threat. • Detecting Product Name - Name of the detecting managed product. • Threat Source Host Name - System name from which the threat originated. • Detecting Product Version - Version number of the detecting product. • Threat Source IPv4 Address - IPv4 address of the system from which the threat originated. McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

The letter "L" means "last" in the Day of Week or Day of Month fields. For example, "
0 15 10 ? *
6L
" means the last Friday of every month at 10:15 am.
The letter "W" means "weekday". So, if you created a Day of Month as "
15W
", this means the
weekday closest to the 15th of the month. Also, you can specify "
LW
", which means the last
weekday of the month.
The pound character "#" identifies the "Nth" day of the month. For example, using "
6#3
" in the Day
of Week field is the third Friday of every month, "
2#1
" is the first Monday, and "
4#5
" is the fifth
Wednesday.
If the month does not have a fifth Wednesday, the task does not run.
The Threat Event Log
Use the Threat Event Log to quickly view and sort through events in the database. The log can be
purged only by age.
You can choose which columns are displayed in the sortable table. You can choose from a variety of
event data to use as columns.
Depending on which products you are managing, you can also take certain actions on the events.
Actions are available in the Actions menu at the bottom of the page.
Common event format
Most managed products now use a common event format. The fields of this format can be used as
columns in the Threat Event Log. These include:
Action Taken
— Action that was taken by the
product in response to the threat.
IPv4 Address
— IPv4 address of the system
which sent the event.
Agent GUID
— Unique identifier of the agent
that forwarded the event.
IPv6 Address
— IPv6 address of the system
which sent the event.
DAT Version
— DAT version on the system that
sent the event.
MAC Address
— MAC address of the system
which sent the event.
Detecting Product Host Name
— Name of the
system hosting the detecting product.
Network Protocol
— Threat target protocol for
network-homed threat classes.
Detecting Product ID
— ID of the detecting product.
Port Number
— Threat target port for
network-homed threat classes.
Detecting Product IPv4 Address
— IPv4 address of
the system hosting the detecting product (if
applicable).
Process Name
— Target process name (if
applicable).
Detecting Product IPv6 Address
— IPv6 address of
the system hosting the detecting product (if
applicable).
Server ID
— Server ID which sent the event.
Detecting Product MAC Address
— MAC address of
the system hosting the detecting product.
Threat Name
— Name of the threat.
Detecting Product Name
— Name of the detecting
managed product.
Threat Source Host Name
— System name from
which the threat originated.
Detecting Product Version
— Version number of
the detecting product.
Threat Source IPv4 Address
— IPv4 address of
the system from which the threat
originated.
11
Other important server information
ePolicy Orchestrator Log Files
116
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide