Integrity Monitoring Events
Vulnerability ProtectionDeep Security Manager collects Integrity Monitoring Events from the Vulnerability ProtectionDeep Security Agents at every heartbeat. The data from the logs is used to populate the various reports, graphs, and charts in the Vulnerability ProtectionDeep Security Manager.
Once collected by the Vulnerability ProtectionDeep Security Manager, Event logs are kept for a period of time which can be set Administration > System Settings > Storage. The default setting is one week.
From the main page you can:
- View (
) the properties of an individual event
- Filter the list: Use the Period and Computer toolbars to filter the list of events
- Export (
) the event list data to a CSV file
- Add an Auto-Tagging Rule
- Add or remove Columns (
) from the Events list view.
- Search (
) for a particular event
Additionally, right-clicking an Event gives you the option to:
- Add Tag(s): Add an Event Tag to this event (See Event Tagging.)
- Remove Tag(s): Remove exiting event Tags
- Computer Details: View the Details window of the computer that generated the log entry
- Integrity Monitoring Rule Properties: View the properties of the Integrity Monitoring Rule associated with this event
Columns for the Integrity Monitoring Events display:
- Time: Time the event took place on the computer.
- Computer: The computer on which this event was logged. (If the computer has been removed, this entry will read "Unknown Computer".)
- Reason: The Integrity Monitoring rule associated with this event.
- Tag(s): Event tags that are applied to this Event.
- Change: The change detected by the integrity rule. Can be: Created, Updated, Deleted, or Renamed.
- Rank: The Ranking system provides a way to quantify the importance of events. By assigning "asset values" to computers, and assigning "severity values" to rules, the importance ("Rank") of an Event is calculated by multiplying the two values together. This allows you to sort Events by Rank.
- Severity: The Integrity Monitoring Rule's severity value
- Type: Type of entity from which the event originated
- Key: Path and file name or registry key from which the event originated
- User: User ID of the file owner
- Process: Process from which the event originated
- Event Origin: The Deep Security component from which the event originated
View Event Properties
Double-clicking an event displays the Properties window for that entry which displays all the information about the event on one page. The Tags tab displays tags that have been attached to this Event. For More information on Event tagging, see Policies > Common Objects > Other > Tags, and Event Tagging in the Reference section.
Filter the List and/or Search for an Event
The Period toolbar lets you filter the list to display only those events that occurred within a specific timeframe.
The Computers toolbar lets you organize the display of event log entries by computer groups or computer Policies.
Use the "Search" or "Advanced Search" options to search, sort, or filter displayed events.
Advanced Search functions (searches are not case sensitive):
- Contains: The entry in the selected column contains the search string
- Does Not Contain: The entry in the selected column does not contain the search string
- Equals: The entry in the selected column exactly matches the search string
- Does Not Equal: The entry in the selected column does not exactly match the search string
- In: The entry in the selected column exactly matches one of the comma-separated search string entries
- Not In: The entry in the selected column does not exactly match any of the comma-separated search string entries
Export
Clicking the Export... button exports all or selected events to a CSV file.
Auto-Tagging
Clicking Auto-Tagging... displays a list of existing Integrity Monitoring Auto-Tagging Rules.