McAfee MAP-3300-SWG Product Guide - Page 262
Alert tokens for Email alert messages, Virus detected at %LOCALTIME, Virus detected at 10:31, System
UPC - 731944547008
View all McAfee MAP-3300-SWG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 262 highlights
Overview of System features Logging, Alerting and SNMP Alert tokens for Email alert messages You can customize alert messages with alert tokens. For example, the message: Virus detected at %LOCALTIME % might become: Virus detected at 10:31. System | Logging, Alerting and SNMP | Email Alerting Alert tokens (also known as replacement tokens or substitution variables) allow you to create meaningful email alert messages for your users. The following tables list the available alert tokens for different circumstances. These tables contain: • The alert token - Names begin and end with the % character. • Description - Type of information that replaces the substitution variable. The following tables provide information on: • Alert tokens for Scanner alerts • Alert tokens for Email notifications • Alert tokens for Quarantine digest messages • Alert tokens for HTTP/ICAP client alert messages • Alert tokens for HTTP/ICAP Download status messages • Alert tokens for Email alerts (Logging and Alerting) Table 259 Alert tokens for Scanner alerts Token name Description %ACTIONNAME%: The action being taken (AV) %ACTIVECONTENT%: The list of active content found in the item (HTML) %ATTACHMENTCONTEXT%: A detailed description of the sub contexts that triggered (only different from %ATTACHMENTNAME% when have multiple condition rules) (Compliance) %ATTACHMENTNAME%: Name of the item being scanned %AVDATVERSION%: The DAT version used by the anti-virus engine (AV) %AVENGINENAME%: The name of the anti-virus engine (AV) %AVENGINEVERSION%: The version of the anti-virus engine (AV) %BLOCKED_URL%: The URL that has been requested and blocked by the URL filtering engine. (URL) %CONTENTREPORT%: A detailed report of the rule(s) triggered; including the term(s), matching text and contextual text (Compliance) %CORRUPTIONTYPE%: The type of corruption that has occurred (Corrupt Content) %DESTINATIONHOST%: Destination Hostname %DESTINATIONIP%: Destination IP address %DETECTIONS%: List of detections in the item %DICTIONARYGROUP%: The name(s) of the content scanning rule(s) that triggered (Compliance) %DLP_FINGERPRINTSOURCE%: Protected Document Name (DLP) 262 McAfee Email and Web Security Appliances 5.6.0 Product Guide