Viewing The History Of Notifications; Configuring The Notification Log - McAfee EPOLICY ORCHESTRATOR 4.0.2 Product Manual

Table of Contents

Advertisement

Sending Notifications

Viewing the history of Notifications

• Selected categories
• First event time
• Event descriptions
• Actual number of events
• Actual categories
• Source systems
• Affected system names
Affected objects
NOTE:
represented, the information was not available in the event file.
d Click Next if finished, or click + to add another notification.
3
If you want the notification to be the execution of an external command:
a Select the desired external command from the External command drop-down list.
b Select the desired language in which you want the variables to appear from the Replace
variables with their values in drop-down list.
c Click Next if finished, or click + to add another notification.
4
After clicking Next, the Summary page appears. Verify the information is correct, then
click Save.
The new notification rule appears in the Notification Rules list.
Viewing the history of Notifications
Use these tasks to access and act on different types of information in the Notification Log
page.
The Notifications Log page allows you to view the history of notifications sent. You can view a
collective summary of all notifications sent, by product or category, or a list of all the specific
notifications sent.
Tasks

Configuring the Notification Log

Viewing the details of Notification Log entries
Purging the Notifications Log
Configuring the Notification Log
Use this task to configure and view a summary of the number of notifications sent by product,
category, priority or rule name over a specified period of time for a specified location of the
System Tree.
In this version of ePolicy Orchestrator, you can now display the information in the Notification
Log as a summary table, pie chart, or bar chart.
166
McAfee ePolicy Orchestrator 4.0.2 Product Guide
Some events do not include this information. If a selection you made is not
• Selected threat or rule name
• Event IDs
• Actual number of systems
• Actual products
• Actual threat or rule names
• Affected system IP addresses
• Time notification sent
Additional information

Advertisement

Table of Contents
loading

Table of Contents