Threat Log Properties Tab - General

Threat Id – identification number of a threat. Threats are assigned their IDs in the order they take place, e.g: Threat 1, Threat 2, etc.
Client Name – name identifying a client in ERA. New clients use the value “Computer Name”. Client Name can be modified with no side effects.
Computer Name – name of computer where the infiltration was found
MAC Address – MAC address of client workstation where the infiltration was found
Primary Server – name of ERA Server, to which the given workstation is connected. If not supplied during the installation of ERA Server, it equals to the computen name where it is running.
Date Received – exact date nad time of reception of the event by ERA Server
Date Occured - exact date nad time of when the infiltration was detected on workstation
Level – emergency level of the threat
Scanner – name of program module which detected the given infiltration
Object – object containing the infiltration
Name – path (local or URL) to infected file and its name
Threat – name of the infiltration
Action – action taken after detection
User – name of the user logged in when the incident occurred
Information – more detailed information about detection
Details – status of detailed information from workstation


Click Copy to Clipboard to copy selected information.