McAfee EPOCDE-AA-BA Product Guide - Page 117

Working with the Threat Event Log, Purging Threat Events

Page 117 highlights

Other important server information ePolicy Orchestrator Log Files 11 • Engine Version - Version number of the detecting product's engine (if applicable). • Event Category - Category of the event. Possible categories depend on the product. • Event Generated Time (UTC) - Time in Coordinated Universal Time that the event was detected. • Event ID - Unique identifier of the event. • Event Received Time (UTC) - Time in Coordinated Universal Time that the event was received by the McAfee ePO server. • File Path - File path of the system which sent the event. • Host Name - Name of the system which sent the event. • Threat Source IPv6 Address - IPv6 address of the system from which the threat originated. • Threat Source MAC Address - MAC address of the system from which the threat originated. • Threat Source URL - URL from which the threat originated. • Threat Source User Name - User name from which the threat originated. • Threat Type - Class of the threat. • User Name - Threat source user name or email address. Working with the Threat Event Log Use these tasks to view and purge the Threat Event Log Tasks • Viewing the Threat Event Log on page 117 Use this task to view the Threat Event Log. • Purging Threat Events on page 117 Use this task to purge Threat Event records from the database. Purging Threat Event records deletes them permanently. • Purging the Threat Event Log on a schedule on page 118 Use this task to purge the Threat Event Log with a scheduled server task. Viewing the Threat Event Log Use this task to view the Threat Event Log. Task For option definitions, click ? in the interface. 1 Click Menu | Reporting | Threat Event Log. 2 Click any of the column titles to sort the events. You can also click Actions | Choose Columns and the Select Columns to Display page appears. 3 From the Available Columns list, select different table columns that meet your needs, then click Save. 4 Select events in the table, then click Actions and select Show Related Systems to see the details of the systems that sent the selected events. Purging Threat Events Use this task to purge Threat Event records from the database. Purging Threat Event records deletes them permanently. McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 117

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

Engine Version
— Version number of the
detecting product’s engine (if applicable).
Threat Source IPv6 Address
— IPv6 address of
the system from which the threat
originated.
Event Category
— Category of the event.
Possible categories depend on the product.
Threat Source MAC Address
— MAC address of
the system from which the threat
originated.
Event Generated Time (UTC)
— Time in Coordinated
Universal Time that the event was detected.
Threat Source URL
— URL from which the
threat originated.
Event ID
— Unique identifier of the event.
Threat Source User Name
— User name from
which the threat originated.
Event Received Time (UTC)
— Time in Coordinated
Universal Time that the event was received
by the McAfee ePO server.
Threat Type
— Class of the threat.
File Path
— File path of the system which sent
the event.
User Name
— Threat source user name or
email address.
Host Name
— Name of the system which sent
the event.
Working with the Threat Event Log
Use these tasks to view and purge the Threat Event Log
Tasks
Viewing the Threat Event Log
on page 117
Use this task to view the Threat Event Log.
Purging Threat Events
on page 117
Use this task to purge Threat Event records from the database. Purging Threat Event
records deletes them permanently.
Purging the Threat Event Log on a schedule
on page 118
Use this task to purge the Threat Event Log with a scheduled server task.
Viewing the Threat Event Log
Use this task to view the Threat Event Log.
Task
For option definitions, click
?
in the interface.
1
Click
Menu
|
Reporting
|
Threat Event Log
.
2
Click any of the column titles to sort the events. You can also click
Actions
|
Choose Columns
and the
Select Columns to Display page appears.
3
From the Available Columns list, select different table columns that meet your needs, then click
Save
.
4
Select events in the table, then click
Actions
and select
Show Related Systems
to see the details of the
systems that sent the selected events.
Purging Threat Events
Use this task to purge Threat Event records from the database. Purging Threat Event records deletes
them permanently.
Other important server information
ePolicy Orchestrator Log Files
11
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide
117