|
|
Client Name
|
Name of client reporting the threat alert
|
Computer Name
|
Workstation/server name (hostname)
|
MAC Address
|
MAC address (network adapter)
|
Primary Server
|
Name of ERAS with which a client is communicating
|
Date Received
|
Time at which the event was logged by ERAS
|
Date Occurred
|
Time at which the event occurred
|
Level
|
Alert level
|
Scanner
|
Name of security feature which detected the threat
|
Object
|
Object type
|
Name
|
Usually a folder where the infiltration is located
|
Threat
|
Name of the detected malicious code
|
Action
|
Action taken by the given security feature
|
User
|
Name of the user that was identified when the incident
occurred
|
Information
|
Information about the detected threat
|
Details
|
Client log submission status
|