|
Detail
|
Description
|
||
|---|---|---|---|
|
Date/Time
|
The date and time that OfficeScan logged the incident
|
||
|
Violation ID
|
The unique ID of the incident
|
||
|
User Name
|
The user name logged on to the computer
|
||
|
Computer
|
The name of computer where OfficeScan detected the transmission
|
||
|
Domain
|
The domain of the computer
|
||
|
IP
|
The IP address of the computer
|
||
|
Channel
|
The channel through which the transmission
occurred
|
||
|
Process
|
The process that facilitated the transmission
of a digital asset (the process depends on the channel)
For
details, see Processes by Channel.
|
||
|
Source
|
The source of the file containing the digital
asset, or channel (if no source is available)
|
||
|
Email Sender
|
The email address where the transmission
originated
|
||
|
Email Subject
|
The subject line of the email message containing the digital asset | ||
|
Email Recipients
|
The destination email address(es) of the
email message
|
||
|
URL
|
The URL of a website or web page
|
||
|
FTP User
|
The user name used to log on to the FTP
server
|
||
|
File Class
|
The type of file in which OfficeScan detected the digital
asset
|
||
|
Rule/Template
|
A list of the exact rule name(s) and template(s)
that triggered the detection
|
||
|
Action
|
The action taken on the transmission
|