
26
3.4.4 Threat Log tab
This tab contains detailed information about individual virus or threat incidents.
Name of client reporting the threat alert
Workstation/server name (hostname)
MAC address (network adapter)
Name of ERAS with which a client is communicating
Time at which the event was logged by ERAS
Time at which the event occurred
Name of security feature which detected the threat
Usually a folder where the infiltration is located
Name of the detected malicious code
Action taken by the given security feature
Name of the user that was identified when the incident occurred
Information about the detected threat
Client log submission status
3.4.5 Firewall Log tab
This tab displays information related to client firewall activity.
Name of client reporting the event
Workstation/server name (hostname)
MAC address (network adapter)
Name of ERAS with which a client is communicating
Time at which the event was logged by ERAS
Time at which the event occurred
Name of the user that was identified when the incident occurred
3.4.6 Event Log tab
This tab shows a list of all system-related events.
Name of client reporting the event
Name of workstation / server (hostname)
MAC address (network adapter)
Name of ERAS with which a client is communicating
Time at which the event was logged by ERAS
Time at which the event occurred
Name of the program component reporting the event
Name of the user associated with the event
Comentarios a estos manuales