Threat Id identification number of a
threat. Threats are assigned their IDs in the order they take
place, e.g: Threat 1, Threat 2, etc.
Client Name name identifying a client
in ERA. New clients use the value Computer
Name. Client Name can be modified with no side effects.
Computer Name name of computer where
the infiltration was found
MAC Address MAC address of client
workstation where the infiltration was found
Primary Server name of ERA Server, to
which the given workstation is connected. If not supplied during
the installation of ERA Server, it equals to the computen name
where it is running.
Date Received exact date nad time of
reception of the event by ERA Server
Date Occured - exact date nad time of
when the infiltration was detected on workstation
Level emergency level of the threat
Scanner name of program module which
detected the given infiltration
Object object containing the
infiltration
Name path (local or URL) to infected
file and its name
Threat name of the infiltration
Action action taken after detection
User name of the user logged in when
the incident occurred
Information more detailed information
about detection
Details status of detailed information
from workstation
Click Copy to Clipboard to copy
selected information.
|