|
Column
|
Description
|
||
|---|---|---|---|
|
Date/Time
|
The date and time that OfficeScan logged the incident
|
||
|
User Name
|
The user name logged on to the computer
|
||
|
Computer
|
The name of computer where OfficeScan detected the transmission
|
||
|
Domain
|
The domain of the computer
|
||
|
IP
|
The IP address of the computer
|
||
|
Rule Name
|
The rule name(s) that triggered the incident
|
||
|
Channel
|
The channel through which the transmission
occurred
|
||
|
Process
|
The process that facilitated the transmission
of a digital asset (the process depends on the channel)
For
details, see Processes by Channel.
|
||
|
Source
|
The source of the file containing the digital
asset, or channel (if no source is available)
|
||
|
Destination
|
The intended destination of the file containing the
digital asset, or channel (if no source is
available)
|
||
|
Action
|
The action taken on the transmission
|
||
|
Details
|
A link which includes additional details about the
transmission
For details, see Data Loss Prevention Log Details.
|