The following table lists the system event logs in Deep Discovery Email Inspector.
ID |
Log Type |
Message |
---|---|---|
11001 |
Update events |
Product Updates: {USER} installed hot fix {VERSION} from {IP} |
11002 |
Update events |
Product Updates: {USER} rolled back hot fix {VERSION} from {IP} |
11003 |
Update events |
Product Updates: Appliance firmware upgraded by {USER} from {IP} |
12001 |
Update events |
Deep Discovery Director: Hotfix update successful |
12002 |
Update events |
Deep Discovery Director: Firmware update successful |
12003 |
Update events |
Deep Discovery Director: Virtual Analyzer image import successful |
12004 |
Update events |
Deep Discovery Director: Configuration update successful |
12005 |
Update events |
Deep Discovery Director: Unregistered by Deep Discovery Director administrator |
12101 |
Update events |
Deep Discovery Director: Suspicious object synchronization with Apex Central disabled |
12201 |
Update events |
Deep Discovery Director: End-User Quarantine configuration disabled |
130xx |
Update events |
ActiveUpdate: {COMPONENT} downloaded manually by {USER} from {IP} |
131xx |
Update events |
ActiveUpdate: {COMPONENT} unsuccessfully downloaded manually by {USER} from {IP} |
132xx |
Update events |
ActiveUpdate: {COMPONENT} downloaded by scheduled update |
133xx |
Update events |
ActiveUpdate: {COMPONENT} unsuccessfully downloaded by scheduled update |
134xx |
Update events |
ActiveUpdate: {COMPONENT} rolled back to version {VERSION} by {USER} from {IP} |
135xx |
Update events |
ActiveUpdate: {COMPONENT} unsuccessfully rolled back by {USER} from {IP} |
136xx |
Update events |
ActiveUpdate Exception - Apply {COMPONENT} {VERSION} to local scanner failed |
20101 |
Audit log |
System started |
20102 |
Audit log |
System stopped |
20201 |
Audit log |
Service started |
20202 |
Audit log |
Service stopped |
20301 |
Audit log |
License: {NAME} license expired, grace period ends on {DATE} |
20302 |
Audit log |
License: {NAME} license expired |
20303 |
Audit log |
License: {NAME} license updated |
20401 |
Audit log |
System Maintenance: Device powered off by {USER} from {IP} |
20402 |
Audit log |
System Maintenance: Device restarted by {USER} from {IP} |
20501 |
Audit log |
Logon: 'admin' logged on from {HOST} via SSH |
20502 |
Audit log |
Logon: Attempted logon with user name ('admin') from {HOST} via SSH |
20503 |
Audit log |
Logon: 'root' logged on from {HOST} with token {NAME} via SSH |
20504 |
Audit log |
Logon: Attempted logon with user name ('root') from {HOST} via SSH |
20505 |
Audit log |
Logon: 'admin' logged off from {HOST} via SSH |
20506 |
Audit log |
Logon: 'root' logged off from {HOST} with token {NAME} via SSH |
20507 |
Audit log |
Logon: Attempted logon with user name {USER} from {HOST} via SSH |
30101 |
Audit log |
Active update source setting was changed |
30102 |
Audit log |
Active update schedule setting was changed |
30201 |
Audit log |
System Settings: Host name saved as {NAME} by {USER} from {IP} |
30202 |
Audit log |
System Settings: {INTERFACE} IPv4 address and subnet mask were saved as {SUBNET} by {USER} from {IP} |
30203 |
Audit log |
System Settings: {INTERFACE} IPv6 address and prefix length were saved as {IP}/{LENGTH} by {USER} from {IP} |
30204 |
Audit log |
System Settings: {INTERFACE} IPv4 gateway saved as {GATEWAY} by {USER} from {IP} |
30205 |
Audit log |
System Settings: {INTERFACE} IPv6 gateway saved as {GATEWAY} by {USER} from {IP} |
30206 |
Audit log |
System Settings: {INTERFACE} primary IPv4 DNS server saved as {IP} and secondary IPv4 DNS server saved as {IP} by {USER} from {IP} |
30207 |
Audit log |
System Settings: {INTERFACE} primary IPv6 DNS server saved as {IP} and secondary IPv6 DNS server saved as {IP} by {USER} from {IP} |
30208 |
Audit log |
System Settings: {INTERFACE} IPv4 address and subnet mask deleted by {USER} from {IP} |
30209 |
Audit log |
System Settings: NIC teaming settings changed by {USER} from {IP} |
30301 |
Audit log |
System Settings: Operation mode saved as {MODE} by {USER} from {IP} |
30401 |
Audit log |
System Settings: Proxy settings modified by {USER} from {IP} |
30402 |
Audit log |
System Settings: Proxy settings unsuccessfully modified by {USER} from {IP} |
30501 |
Audit log |
System Settings: SMTP server settings modified by {USER} from {IP} |
30601 |
Audit log |
System Settings: System time zone saved as {ZONE} by {USER} from {IP} |
30602 |
Audit log |
System Settings: NTP server synchronization enabled by {USER} from {IP} |
30603 |
Audit log |
System Settings: NTP server synchronization disabled by {USER} from {IP} |
30604 |
Audit log |
System Settings: System time saved as {TIME} by {USER} from {IP} |
30605 |
Audit log |
System Settings: Database time zone saved as {ZONE} by {USER} from {IP} |
30606 |
Audit log |
System Settings: NTP server saved as {NAME} by {USER} from {IP} |
30701 |
Audit log |
System Settings: SNMP settings modified by {USER} from {IP} |
30702 |
Audit log |
System Settings: SNMP MIB files downloaded by {USER} from {IP} |
30703 |
Audit log |
System setting: Session timeout setting modified by {USER} from {IP} |
30801 |
Audit log |
Mail Settings: SMTP Connection setting saved by {USER} from {IP} |
30802 |
Audit log |
Mail Settings: TLS certificate uploaded by {USER} from {IP} |
30803 |
Audit log |
Mail Settings: TLS certificate downloaded by {USER} from {IP} |
30901 |
Audit log |
Mail Settings: Delivery profiles exported by {USER} from {IP} |
30902 |
Audit log |
Mail Settings: Delivery profiles unsuccessfully exported by {USER} from {IP} |
30903 |
Audit log |
Mail Settings: Delivery profiles imported by {USER} from {IP} |
30904 |
Audit log |
Mail Settings: Mail Settings: Delivery profiles unsuccessfully imported due to maximum entries (256) exceeded |
30905 |
Audit log |
Mail Settings: Delivery profiles unsuccessfully imported by {USER} from {IP} |
30906 |
Audit log |
Mail Settings: Delivery profile added by {USER} from {IP} |
30907 |
Audit log |
Mail Settings: Delivery profile modified by {USER} from {IP} |
30908 |
Audit log |
Mail Settings: Delivery profile deleted by {USER} from {IP} |
31001 |
Audit log |
Mail Settings: Mail settings modified by {USER} from {IP} |
31101 |
Audit log |
Mail Settings: SMTP server greeting saved by {USER} from {IP} |
31102 |
Audit log |
Mail Settings: Internal domain settings modified by {USER} from {IP} |
31103 |
Audit log |
Mail Settings: Internal domains imported by {USER} from {IP} |
31104 |
Audit log |
Mail Settings: Internal domain '%s' added through a policy by {USER} from {IP} |
31201 |
Audit log |
Log Settings: {NAME} syslog server profile created by {USER} from {IP} |
31202 |
Audit log |
Log Settings: {NAME} syslog server profile deleted by {USER} from {IP} |
31203 |
Audit log |
Log Settings: {NAME} syslog server profile modified by {USER} from {IP} |
31204 |
Audit log |
Log Settings: {NAME} enabled by {USER} from {IP} |
31205 |
Audit log |
Log Settings: {NAME} disabled by {USER} from {IP} |
31206 |
Audit log |
Integrated Products/Services: {USER} synchronized data for all LDAP servers from {IP} |
31207 |
Audit log |
Integrated Products/Services: {USER} enabled LDAP server {NAME} from {IP} Log Settings: {NAME} disabled by {USER} from {IP} |
31208 |
Audit log |
Integrated Products/Services: {USER} disabled LDAP server {NAME} from {IP} |
31301 |
Audit log |
Integrated Products/Services: SFTP Upload settings modified by {USER} from {IP} |
31402 |
Audit log |
Integrated Products/Services: {USER} added LDAP server {NAME} from {IP} |
31403 |
Audit log |
Integrated Products/Services: {USER} modified LDAP server {NAME} from {IP} |
31404 |
Audit log |
Integrated Products/Services: {USER} deleted LDAP server {NAME} from {IP} |
31405 |
Audit log |
Integrated Products/Services: {USER} synchronized data for LDAP server {NAME} from {IP} |
31406 |
Audit log |
Integrated Products/Services: {USER} synchronized data for all LDAP servers from {IP} |
31407 |
Audit log |
Integrated Products/Services: {USER} enabled LDAP server {NAME} from {IP} |
31408 |
Audit log |
Integrated Products/Services: {USER} disabled LDAP server {NAME} from {IP} |
31501 |
Audit log |
Integrated Products/Services: Threat Intelligent Sharing settings modified by {USER} from {IP} |
31502 |
Audit log |
Integrated Products/Services: {USER} generate suspicious objects list from {IP} |
31601 |
Audit log |
Integrated Products/Services: Auxiliary Products/Services settings modified by {USER} from {IP} |
31602 |
Audit log |
Integrated Products/Services: {USER} clicked Auxiliary Products/Services > Distribute Now from {IP} |
31701 |
Audit log |
Systems Settings: Apex Central settings modified by {USER} from {IP} |
31702 |
Audit log |
System Settings: Suspicious object synchronization enabled by {USER} from {IP} |
31703 |
Audit log |
System Settings: Suspicious object synchronization disabled by {USER} from {IP} |
31801 |
Audit log |
System Settings: Proxy settings for Deep Discovery Director modified by {USER} by {IP} |
31802 |
Audit log |
System Settings: Registered to Deep Discovery Director by {USER} from {IP} |
31803 |
Audit log |
System Settings: Unregistered from Deep Discovery Director by {USER} from {IP} |
31804 |
Audit log |
System Settings: Deep Discovery Director fingerprint trusted by {USER} from {IP} |
31901 |
Audit log |
Scanning / Analysis: Image imported by {USER} from {IP} |
31902 |
Audit log |
Scanning / Analysis: Image deleted by {USER} from {IP} |
31903 |
Audit log |
Scanning / Analysis: Number of instances for each Virtual Analyzer image modified by {USER} from {IP} |
32001 |
Audit log |
Scanning / Analysis: Virtual Analyzer settings modified by {USER} from {IP} |
32101 |
Audit log |
Scanning / Analysis: {PRODUCT NAME} registered to the external Virtual Analyzer |
32102 |
Audit log |
Scanning / Analysis: Unable to register to the external Virtual Analyzer |
32103 |
Audit log |
Scanning / Analysis: {PRODUCT NAME} unregistered from the external Virtual Analyzer |
32104 |
Audit log |
Scanning / Analysis: Virtual Analyzer external integration settings modified by {USER} from ''%s'' |
32201 |
Audit log |
Scanning / Analysis: File Passwords setting was modified by {USER} from {IP} |
32301 |
Audit log |
Scanning / Analysis: Smart Protection settings modified by {USER} from {IP} |
32401 |
Audit log |
Scanning / Analysis: Smart Feedback settings modified by {USER} from {IP} |
32501 |
Audit log |
Scanning / Analysis: {USER} added YARA rule {NAME} from {IP} |
32502 |
Audit log |
Scanning / Analysis: {USER} modified YARA rule {NAME} from {IP} |
32503 |
Audit log |
Scanning / Analysis: {USER} deleted YARA rule {NAME} from {IP} |
32504 |
Audit log |
Scanning / Analysis: {USER} modified status for YARA rule {NAME} from {IP} |
32510 |
Audit log |
Scanning / Analysis: Time-of-Click settings modified by {USER} from {IP} |
32520 |
Audit log |
Scanning / Analysis: High-Profile Users settings modified by {USER} from {IP} |
32521 |
Audit log |
Scanning / Analysis: Internal Domains settings modified by {USER} from {IP} |
32522 |
Audit log |
Scanning / Analysis: Approved Senders settings modified by {USER} from {IP} |
32523 |
Audit log |
Scanning / Analysis: Cousin Domains settings modified by {USER} from {IP} |
32530 |
Audit log |
Scanning / Analysis: URL Scanning setting modified by {USER} from {IP} |
32601 |
Audit log |
System Maintenance: Configuration imported by {USER} from {IP} |
32602 |
Audit log |
System Maintenance: Configuration unsuccessfully imported by {USER} from {IP} |
32603 |
Audit log |
System Maintenance: Configuration exported by {USER} from {IP} |
32604 |
Audit log |
System Maintenance: Configuration unsuccessfully exported by {USER} from {IP} |
32701 |
Audit log |
System Maintenance: Data purge started automatically |
32702 |
Audit log |
System Maintenance: Data purge completed ({MIN} min {SEC} s) |
32703 |
Audit log |
System Maintenance: Storage maintenance setting modified by {USER} from {IP} |
32801 |
Audit log |
System Maintenance: System log level setting modified by {USER} from {IP} |
32901 |
Audit log |
Accounts / Contacts: {USER} created the account {NAME} from {IP} |
32902 |
Audit log |
Accounts / Contacts: {USER} deleted the account {NAME} from {IP} |
32903 |
Audit log |
Accounts / Contacts: {USER} modified the account {NAME} from {IP} |
32904 |
Audit log |
Accounts / Contacts: {USER} unlocked the account {NAME} from {IP} |
33001 |
Audit log |
Logon: {USER} logged on as {ROLE} role from {IP} |
33002 |
Audit log |
Logon: {USER} logged off from {IP} |
33003 |
Audit log |
Logon: Attempted logon with an invalid user name ({USER}) or password from {IP} |
33004 |
Audit log |
Logon: Attempted logon with a disabled user name ({USER}) from {IP} |
33005 |
Audit log |
Logon: Attempted logon with a locked user name {NAME} from {IP} |
33006 |
Audit log |
Logon: Unlocked user name {NAME} from {IP} |
33007 |
Audit log |
RDQA Logon: ''{USER}'' logged on as {NAME} role from {IP} |
33008 |
Audit log |
RDQA Logon: ''{USER}" logged off |
33009 |
Audit log |
RDQA Logon: Attempted logon with an invalid user name ''{USER}'' or password from {IP} |
33010 |
Audit log |
RDQA Logon: Attempted logon with a disabled user name ''{USER}'' from {IP} |
33011 |
Audit log |
RDQA Logon: Attempted logon with a locked user name ''{USER}'' from {IP} |
33012 |
Audit log |
RDQA Logon: Unlocked user name ''{USER}'' from {IP} |
33101 |
Audit log |
Accounts / Contacts: Contacts for alert notifications and reports modified by {USER} from {IP} |
33201 |
Audit log |
Accounts / Contacts: {USER} modified the password for {NAME} from {IP} |
33202 |
Audit log |
Accounts / Contacts: {USER} added SAML group {NAME} from {IP} |
33203 |
Audit log |
Accounts / Contacts: {USER} modified SAML group {NAME} from {IP} |
33204 |
Audit log |
Accounts / Contacts: {USER} deleted SAML group {NAME} from {IP} |
33205 |
Audit log |
Accounts / Contacts: {USER} enabled SAML group {NAME} from {IP} |
33206 |
Audit log |
Accounts / Contacts: {USER} disabled SAML group {NAME} from {IP} |
33301 |
Audit log |
License: {NAME} license activated by {USER} from {IP} |
33302 |
Audit log |
License: Attempted to activate {NAME} license using an invalid Activation Code by {USER} from {IP} |
33303 |
Audit log |
License: {NAME} license updated by {USER} from {IP} |
33401 |
Audit log |
Policy: Policy setting changed by {USER} from {IP} |
33402 |
Audit log |
Policy: {USER} added policy {NAME} from {IP} |
33403 |
Audit log |
Policy: {USER} modified policy {NAME} from {IP} |
33404 |
Audit log |
Policy: {USER} imported policies from {IP} |
33405 |
Audit log |
Policy: {USER} deleted policy {NAME} from {IP} |
33406 |
Audit log |
Policy: {USER} copied policy {NAME} from {IP} |
33407 |
Audit log |
Policy: {USER} enabled policy {NAME} from {IP} |
33408 |
Audit log |
Policy: {USER} disabled policy {NAME} from {IP} |
33409 |
Audit log |
Policy: {USER} modified priority setting of policy {NAME} from {PRIORITY} to {PRIORITY} from {IP} |
33410 |
Audit log |
Policy: {USER} added content filtering rule {NAME} from {IP} |
33411 |
Audit log |
Policy: {USER} updated content filtering rule {NAME} from {IP} |
33412 |
Audit log |
Policy: {USER} copied content filtering rule {NAME} from {IP} |
33413 |
Audit log |
Policy: {USER} deleted content filtering rule {NAME} from {IP} |
33414 |
Audit log |
Policy: {USER} added antispam rule {NAME} from {IP} |
33415 |
Audit log |
Policy: {USER} updated antispam rule {NAME} from {IP} |
33416 |
Audit log |
Policy: {USER} copied antispam rule {NAME} from {IP} |
33417 |
Audit log |
Policy: {USER} deleted antispam rule {NAME} from {IP} |
33418 |
Audit log |
Policy: {USER} added advanced threat protection rule {NAME} from {IP} |
33419 |
Audit log |
Policy: {USER} updated advanced threat protection rule {NAME} from {IP} |
33420 |
Audit log |
Policy: {USER} copied advanced threat protection rule {NAME} from {IP} |
33421 |
Audit log |
Policy: {USER} deleted advanced threat protection rule {NAME} from {IP} |
33422 |
Audit log |
Policy: {USER} added policy notification {NAME} from {IP} |
33423 |
Audit log |
Policy: {USER} modified policy notification {NAME} from {IP} |
33424 |
Audit log |
Policy: {USER} deleted some policy notifications from {IP} |
33425 |
Audit log |
Policy: {USER} copied policy notification {NAME} from {IP} |
33426 |
Audit log |
Policy: {USER} added archive server {NAME} from {IP} |
33427 |
Audit log |
Policy: {USER} modified archive server {NAME} from {IP} |
33428 |
Audit log |
Policy: {USER} deleted some archive servers from {IP} |
33429 |
Audit log |
Policy: {USER} added DLP rule {NAME} from {IP} |
33430 |
Audit log |
Policy: '{USER} updated DLP rule {NAME} from {IP} |
33431 |
Audit log |
Policy: {USER} copied DLP rule {NAME} from {IP} |
33432 |
Audit log |
Policy: {USER} deleted DLP rule {NAME} from {IP} |
33433 |
Audit log |
Policy Objects: {USER} added expression {NAME} from {IP} |
33434 |
Audit log |
Policy Objects: {USER} updated expression {NAME} from {IP} |
33435 |
Audit log |
Policy Objects: {USER} copied expression {NAME} from {IP} |
33436 |
Audit log |
Policy Objects: {USER} deleted expression {NAME} from {IP} |
33437 |
Audit log |
Policy Objects: {USER} imported expression file from {IP} |
33438 |
Audit log |
Policy Objects: {USER} added file attribute {NAME} from {IP} |
33439 |
Audit log |
Policy Objects: {USER} updated file attribute {NAME} from {IP} |
33440 |
Audit log |
Policy Objects: {USER} copied file attribute {NAME} from {IP} |
33441 |
Audit log |
Policy Objects: {USER} deleted file attribute {NAME} from {IP} |
33442 |
Audit log |
Policy Objects: {USER} imported file attribute file from {IP} |
33443 |
Audit log |
Policy Objects: {USER} added keyword list {NAME} from {IP} |
33444 |
Audit log |
Policy Objects: {USER} updated keyword list {NAME} from {IP} |
33445 |
Audit log |
Policy Objects: {USER} copied keyword list {NAME} from {IP} |
33446 |
Audit log |
Policy Objects: {USER} deleted keyword list {NAME}from {IP} |
33447 |
Audit log |
Policy Objects: {USER} imported keyword list file from {IP} |
33448 |
Audit log |
Policy Objects: {USER} added template {NAME} from {IP} |
33449 |
Audit log |
Policy Objects: {USER} updated template {NAME} from {IP} |
33450 |
Audit log |
Policy Objects: {USER} copied template {NAME} from {IP} |
33451 |
Audit log |
Policy Objects: {USER} deleted template {NAME} from {IP} |
33452 |
Audit log |
Policy Objects: {USER} imported template file from {IP} |
33453 |
Audit log |
Policy Objects: {USER} added policy stamp {NAME} from {IP} |
33454 |
Audit log |
Policy Objects: {USER} modified policy stamp {NAME} from {IP} |
33455 |
Audit log |
Policy Objects: {USER} deleted some policy stamps from {IP} |
33456 |
Audit log |
Policy Objects: {USER} enabled policy stamp {NAME} from {IP} |
33457 |
Audit log |
Policy Objects: {USER} disabled policy stamp {NAME} from {IP} |
33501 |
Audit log |
Policy: Policy exception settings modified by {USER} from {IP} |
33502 |
Audit log |
Policy: Graymail exception settings modified by {USER} from {IP} |
33601 |
Audit log |
Alerts: Alert rule settings modified by {USER} from {IP} |
33701 |
Audit log |
Report: Report settings changed by {USER} from {IP} |
33801 |
Audit log |
Detected Messages: Message {NAME} downloaded by {USER} from {IP} |
33802 |
Audit log |
Detected Messages: Investigation package {NAME} downloaded by {USER} from {IP} |
33901 |
Audit log |
Quarantine: MsgID {ID} released by {USER} from {IP} |
33902 |
Audit log |
Quarantine: MsgID {ID} deleted by {USER} from {IP} |
33903 |
Audit log |
Quarantine: Resumed processing message {ID} by {USER} from {IP} |
33904 |
Audit log |
Quarantine: Message {ID} unlocked and reprocessed by {USER} from {IP} |
34001 |
Audit log |
Unable to distribute suspicious objects to Check Point OPSEC. Verify that the Check Point OPSEC settings are correct and that no network problem exists. |
34002 |
Audit log |
Unable to distribute suspicious objects to Trend Micro TippingPoint SMS. Verify that the Trend Micro TippingPoint SMS settings are correct and that no network problem exists. |
34003 |
Audit log |
Unable to distribute suspicious objects to IBM Security Network Protection XGS. Verify that the IBM Security Network Protection XGS settings are correct and that no network problem exists. |
34004 |
Audit log |
Unable to distribute suspicious objects to Palo Alto Panorama or Firewalls. Verify that the Palo Alto Panorama or Firewalls settings are correct and that no network problem exists. |
34005 |
Audit log |
Unable to generate suspicious objects list. Verify that the Threat Intelligence Sharing settings are correct. |
34101 |
Audit log |
End-User Quarantine: EUQ settings modified by {USER} from {IP} |
34102 |
Audit log |
End-User Quarantine: User Quarantine Access settings modified by {USER} from {IP} |
34103 |
Audit log |
End-User Quarantine: EUQ Digest settings modified by {USER} from {IP} |
34201 |
Audit log |
Sender Filtering: Approved Senders list modified by {USER} from {IP} |
34202 |
Audit log |
Sender Filtering: ERS settings modified by {USER} from {IP} |
34203 |
Audit log |
Sender Filtering: DHA protection settings modified by {USER} from {IP} |
34204 |
Audit log |
Sender Filtering: Bounced attack protection settings modified by {USER} from {IP} |
34205 |
Audit log |
Sender Filtering: SMTP traffic throttling settings modified by {USER} from {IP} |
34206 |
Audit log |
Sender Filtering: Blocked Senders list modified by {USER} from {IP} |
34207 |
Audit log |
Sender Filtering: Some Blocked Senders list entries moved to Approved Senders list by {USER} from {IP} |
34208 |
Audit log |
Sender Filtering: SPF settings modified by {USER} from {IP} |
34209 |
Audit log |
Sender Filtering: DKIM Authentication settings modified by {USER} from {IP} |
34210 |
Audit log |
Sender Filtering: DKIM Signatures settings modified by {USER} from {IP} |
34211 |
Audit log |
Sender Filtering: DMARC settings modified by {USER} from {IP} |
35001 |
Audit log |
Message Queues: Messages deleted by {USER} from {IP} |
35002 |
Audit log |
Message Queues: Messages delivered by {USER} from {IP} |
35003 |
Audit log |
Message Queues: All messages delivered by {USER} from {IP} |
35004 |
Audit log |
Message Tracking: Investigation package {NAME} downloaded by {USER} from {IP} |
35005 |
Audit log |
Email Submissions: Message submitted by {USER} from {IP} |
35006 |
Audit log |
Message Queues: Messages rerouted by to {IP} by {USER} from {IP} |
35007 |
Audit log |
Message Queues: All messages rerouted by to {IP} by {USER} from {IP} |
35011 |
Audit log |
Integrated Products/Services: Registered to Email Encryption server by {USER} from {IP} |
35012 |
Audit log |
Integrated Products/Services: Domain {DOMAIN} added to Email Encryption server by {USER} from {IP} |
35013 |
Audit log |
Integrated Products/Services: Domain {DOMAIN} deleted from Email Encryption server by {USER} from {IP} |
35014 |
Audit log |
Integrated Products/Services: Key file uploaded to Email Encryption server for domain {DOMAIN} by {USER} from {IP} |
35016 |
Audit log |
Integrated Products/Services: Default sender modified to {SENDER} for Email Encryption by {USER} from {IP} |
35017 |
Audit log |
Integrated Products/Services: Email address modified to {EMAIL} for Email Encryption by {USER} from {IP} |
35021 |
Audit log |
Integrated Products/Services: {USER} added identity provider server {NAME} from {IP} |
35022 |
Audit log |
Integrated Products/Services: {USER} modified identity provider server {NAME} from {IP} |
35023 |
Audit log |
Integrated Products/Services: {USER} deleted identity provider server {NAME} from {IP} |
35024 |
Audit log |
Integrated Products/Services: {USER} enabled identity provider server {NAME} from {IP} |
35025 |
Audit log |
Integrated Products/Services: {USER} disabled identity provider server {NAME} from {IP} |
35026 |
Audit log |
Integrated Products/Services: {USER} updated certificate for management console from {IP} |
35027 |
Audit log |
Integrated Products/Services: {USER} updated certificate for EUQ console from {IP} |
35028 |
Audit log |
Logon: {USER} logged on via identity provider server {NAME} as {ROLE} from {IP} |
35029 |
Audit log |
Logon: {USER} logged off via identity provider server {NAME} from {IP} |
41001 |
EUQ log |
EUQ: {USER} logged on from {IP} |
41002 |
EUQ log |
EUQ: {USER} logged off from {IP} |
41003 |
EUQ log |
EUQ: MsgID {ID} released by {USER} from {IP} |
41004 |
EUQ log |
EUQ: MsgID {ID} deleted by {USER} from {IP} |
41005 |
EUQ log |
EUQ: Approved Senders list modified by {USER} from {IP} |
41006 |
EUQ log |
EUQ: {USER} logged on via identity provider server {NAME} from {IP} |
41007 |
EUQ log |
EUQ: {USER} logged off via identity provider server {NAME} from {IP} |