
27
3.4.7 Scan Log tab
This tab lists results of On-demand computer scans that were started remotely, locally on client computers, or as
scheduled tasks.
ID of the corresponding entry in the database (ID is in the form: Scan Number)
Name of client where the scan was performed
Name of workstation / server (hostname)
MAC address (network adapter)
Name of the ERA Server a client is communicating with
Time at which the scan event was logged by ERAS
Time at which the scan took place on client
Scanned files, folders and devices
Number of cleaned (or deleted) objects
Name of the user that was identified when the incident occurred
Client log submission status
3.4.8 Mobile Log tab
This tab displays detailed logs from the mobile phones connected to ERA Server.
Network ID of the mobile device
Name of client where action was performed
Name of workstation / server (hostname)
MAC address (network adapter)
Name of the ERA Server a client is communicating with
Time at which the event was logged by ERAS
Time at which the event took place on client
Type of a log (e.g. Security Audit Log, SMS Antispam Log)
Object to which the event is related (e.g. SMS, file, ...)
Particular object to which the event is related (e.g. SMS sender phone number, path to file, ...)
Action performed (or error encountered) during the event
3.4.9 Quarantine tab
This tab consolidates all quarantine entries in your network.
ID number of the quarantined object assigned in order of occurrence
Time at which the scan event was logged by ERAS
Time passed from the first occurrence of the quarantined item
Time passed from the latest occurrence of the quarantined item
Usually a folder where the infiltration is located
Name of the quarantined file
Type of extension of the quarantined file
Size of the quarantined file
Reason for quarantining - usually a description of the threat type
Number of clients quarantining the object
Number of times the object was quarantined
Indicates whether the object was requested to be downloaded to the server
Comentarios a estos manuales