McAfee MAP-3300-SWG Product Guide - Page 262

Alert tokens for Email alert messages, Virus detected at %LOCALTIME, Virus detected at 10:31, System

Page 262 highlights

Overview of System features Logging, Alerting and SNMP Alert tokens for Email alert messages You can customize alert messages with alert tokens. For example, the message: Virus detected at %LOCALTIME % might become: Virus detected at 10:31. System | Logging, Alerting and SNMP | Email Alerting Alert tokens (also known as replacement tokens or substitution variables) allow you to create meaningful email alert messages for your users. The following tables list the available alert tokens for different circumstances. These tables contain: • The alert token - Names begin and end with the % character. • Description - Type of information that replaces the substitution variable. The following tables provide information on: • Alert tokens for Scanner alerts • Alert tokens for Email notifications • Alert tokens for Quarantine digest messages • Alert tokens for HTTP/ICAP client alert messages • Alert tokens for HTTP/ICAP Download status messages • Alert tokens for Email alerts (Logging and Alerting) Table 259 Alert tokens for Scanner alerts Token name Description %ACTIONNAME%: The action being taken (AV) %ACTIVECONTENT%: The list of active content found in the item (HTML) %ATTACHMENTCONTEXT%: A detailed description of the sub contexts that triggered (only different from %ATTACHMENTNAME% when have multiple condition rules) (Compliance) %ATTACHMENTNAME%: Name of the item being scanned %AVDATVERSION%: The DAT version used by the anti-virus engine (AV) %AVENGINENAME%: The name of the anti-virus engine (AV) %AVENGINEVERSION%: The version of the anti-virus engine (AV) %BLOCKED_URL%: The URL that has been requested and blocked by the URL filtering engine. (URL) %CONTENTREPORT%: A detailed report of the rule(s) triggered; including the term(s), matching text and contextual text (Compliance) %CORRUPTIONTYPE%: The type of corruption that has occurred (Corrupt Content) %DESTINATIONHOST%: Destination Hostname %DESTINATIONIP%: Destination IP address %DETECTIONS%: List of detections in the item %DICTIONARYGROUP%: The name(s) of the content scanning rule(s) that triggered (Compliance) %DLP_FINGERPRINTSOURCE%: Protected Document Name (DLP) 262 McAfee Email and Web Security Appliances 5.6.0 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Alert tokens for Email alert messages
You can customize alert messages with alert tokens. For example, the message:
Virus detected at %LOCALTIME
%
might become:
Virus detected at 10:31
.
System
|
Logging, Alerting and SNMP
|
Email Alerting
Alert tokens (also known as replacement tokens or substitution variables) allow you to create
meaningful email alert messages for your users.
The following tables list the available alert tokens for different circumstances.
These tables contain:
The alert token — Names begin and end with the
%
character.
Description — Type of information that replaces the substitution variable.
The following tables provide information on:
Alert tokens for Scanner alerts
Alert tokens for Email notifications
Alert tokens for Quarantine digest messages
Alert tokens for HTTP/ICAP client alert messages
Alert tokens for HTTP/ICAP Download status messages
Alert tokens for Email alerts (Logging and Alerting)
Table 259
Alert tokens for Scanner alerts
Token name
Description
%ACTIONNAME%:
The action being taken (AV)
%ACTIVECONTENT%:
The list of active content found in the item (HTML)
%ATTACHMENTCONTEXT%:
A detailed description of the sub contexts that triggered (only
different from %ATTACHMENTNAME% when have multiple
condition rules) (Compliance)
%ATTACHMENTNAME%:
Name of the item being scanned
%AVDATVERSION%:
The DAT version used by the anti-virus engine (AV)
%AVENGINENAME%:
The name of the anti-virus engine (AV)
%AVENGINEVERSION%:
The version of the anti-virus engine (AV)
%BLOCKED_URL%:
The URL that has been requested and blocked by the URL
filtering engine. (URL)
%CONTENTREPORT%:
A detailed report of the rule(s) triggered; including the
term(s), matching text and contextual text (Compliance)
%CORRUPTIONTYPE%:
The type of corruption that has occurred (Corrupt Content)
%DESTINATIONHOST%:
Destination Hostname
%DESTINATIONIP%:
Destination IP address
%DETECTIONS%:
List of detections in the item
%DICTIONARYGROUP%:
The name(s) of the content scanning rule(s) that triggered
(Compliance)
%DLP_FINGERPRINTSOURCE%:
Protected Document Name (DLP)
Overview of System features
Logging, Alerting and SNMP
262
McAfee Email and Web Security Appliances 5.6.0 Product Guide