McAfee EPOCDE-AA-BA - ePolicy Orchestrator - PC Product Manual page 117

Product guide
Table of Contents

Advertisement

Engine Version — Version number of the
detecting product's engine (if applicable).
Event Category — Category of the event.
Possible categories depend on the product.
Event Generated Time (UTC) — Time in Coordinated
Universal Time that the event was detected.
Event ID — Unique identifier of the event.
Event Received Time (UTC) — Time in Coordinated
Universal Time that the event was received
by the McAfee ePO server.
File Path — File path of the system which sent
the event.
Host Name — Name of the system which sent
the event.
Working with the Threat Event Log
Use these tasks to view and purge the Threat Event Log
Tasks
Viewing the Threat Event Log on page 117
Use this task to view the Threat Event Log.
Purging Threat Events on page 117
Use this task to purge Threat Event records from the database. Purging Threat Event
records deletes them permanently.
Purging the Threat Event Log on a schedule on page 118
Use this task to purge the Threat Event Log with a scheduled server task.
Viewing the Threat Event Log
Use this task to view the Threat Event Log.
Task
For option definitions, click ? in the interface.
Click Menu | Reporting | Threat Event Log.
1
Click any of the column titles to sort the events. You can also click Actions | Choose Columns and the
2
Select Columns to Display page appears.
3
From the Available Columns list, select different table columns that meet your needs, then click
Save.
4
Select events in the table, then click Actions and select Show Related Systems to see the details of the
systems that sent the selected events.
Purging Threat Events
Use this task to purge Threat Event records from the database. Purging Threat Event records deletes
them permanently.
Other important server information
Threat Source IPv6 Address — IPv6 address of
the system from which the threat
originated.
Threat Source MAC Address — MAC address of
the system from which the threat
originated.
Threat Source URL — URL from which the
threat originated.
Threat Source User Name — User name from
which the threat originated.
Threat Type — Class of the threat.
User Name — Threat source user name or
email address.
®
®
McAfee
ePolicy Orchestrator
ePolicy Orchestrator Log Files
4.6.0 Software Product Guide
11
117

Advertisement

Table of Contents
loading

This manual is also suitable for:

Epolicy orchestrator 4.6.0

Table of Contents