Symantec Enterprise Security Manager 9.0 lets you access detailed information about the messages that are reported during policy runs.
Table: Message information describes the information that you can access about messages.
Table: Message information
The message category includes the following:
This category contains the messages that report changes to snapshots on Symantec ESM agent computers; specifically, additions, modifications, and deletions.
ESM administrative information
This category contains the messages that inform the user of actions that Symantec Enterprise Security Manager took. For example, messages regarding the creation of a snapshot or checks that were not performed fall into this category. Unexpected actions can indicate security risks.
This category contains the messages that inform users of Symantec Enterprise Security Manager policy configuration errors. The errors that the messages report can be corrected by adjusting Symantec Enterprise Security Manager policy configurations.
This category contains the messages that are derived from the Integrated Command Engine module. These messages are difficult to classify because the meaning of the messages can vary depending on the Integrated Command Engine scripts.
This category contains the messages that report information on the state of operating system patches. These messages report the details whether a computer has all of the necessary patches.
This category contains the messages that report whether a Symantec ESM agent host computer complies with a Symantec Enterprise Security Manager policy. The security levels that are associated with these messages rate the severity of the security risk to these computers.
This category contains the messages that report errors on Symantec ESM agent host computers that prevent or invalidate a policy run. These can be regarded as audit errors.
This category contains the messages that report the information that can be used to manually assess or audit a computer. These messages do not have a direct implication regarding the security state of the computer.
Icons that appear in the upper-right corner show how each security problem affects the confidentiality, integrity, and availability of your information.