Integrity Monitoring Events

Vulnerability ProtectionDeep Security Manager collects Integrity Monitoring Events from the Vulnerability ProtectionDeep Security Agents at every heartbeat. The data from the logs is used to populate the various reports, graphs, and charts in the Vulnerability ProtectionDeep Security Manager.

Once collected by the Vulnerability ProtectionDeep Security Manager, Event logs are kept for a period of time which can be set Administration > System Settings > Storage. The default setting is one week.

From the main page you can:

Additionally, right-clicking an Event gives you the option to:

Columns for the Integrity Monitoring Events display:

View Event Properties

Double-clicking an event displays the Properties window for that entry which displays all the information about the event on one page. The Tags tab displays tags that have been attached to this Event. For More information on Event tagging, see Policies > Common Objects > Other > Tags, and Event Tagging in the Reference section.

Filter the List and/or Search for an Event

The Period toolbar lets you filter the list to display only those events that occurred within a specific timeframe.

The Computers toolbar lets you organize the display of event log entries by computer groups or computer Policies.

Use the "Search" or "Advanced Search" options to search, sort, or filter displayed events.

Advanced Search functions (searches are not case sensitive):

Export

Clicking the Export... button exports all or selected events to a CSV file.

Auto-Tagging

Clicking Auto-Tagging... displays a list of existing Integrity Monitoring Auto-Tagging Rules.