The following table describes token variables for customizing C&C Callback event notification messages.
For the list of standard token variables supported by all event notifications, see Standard Token Variables.
| Variable | Description | 
|---|---|
| %CnC_LIST_SRC% | Name of the list that contains the callback address | 
| %CNC_PD_NAME% | Product ID of the managed product server that sent the log | 
| %CNC_PD_VERSION% | Version of the managed product server that sent the log | 
| %CNC_PD_NODE% | Endpoint name of the managed product server that sent the log | 
| %CNC_PD_IP% | IP address of the managed product server that sent the log | 
| %CNC_EVTTIME% | Time the log was generated | 
| %CNC_AGENTNAME% | Name of the Security Agent endpoint that detected the callback | 
| %CNC_AGENTIP% | IP address of the Security Agent endpoint that detected the callback | 
| %CNC_AGENTDOMAIN% | Apex One domain of the Security Agent endpoint that detected the callback | 
| %CNC_POLICY_RULE% | Name or rule ID of the policy that detected the callback | 
| %CNC_ACTION% | Action result from the security log, personal firewall, NCIE log, or web security log | 
| %CNC_EMAIL_SENDER% | Email sender associated with the callback | 
| %CNC_EMAIL_SUBJECT% | Email subject associated with the callback | 
| %CNC_RISKLEVEL% | Risk level of the malware groups associated with the C&C server | 
| %CNC_DETECT_SOURCE% | The C&C list that defined the detection rule | 
| %CNC_CHANNEL% | The type ID that indicates the destination format | 
| %CNC_URL% | The remote URL that the endpoint attempted to contact | 
| %CNC_URL_CATEGORY% | The URL category of the site that the endpoint attempted to contact | 
| %CNC_IP_PORT% | The C&C server IP address and port | 
| %CNC_EMAIL_REPT% | Email recipient associated with the callback | 
| %CNC_FIRST_SEEN% | The first known detection of the C&C server | 
| %CNC_LAST_SEEN% | The last known detection of the C&C server | 
| %CNC_LOCATION% | The country code of the C&C server | 
| %CNC_MALEWARE_FAMILY% | The malware family associated with the C&C detection | 
| %CNC_ATTACK_GROUP% | The C&C group lists | 
| %CNC_PROCESS_NAME% | The process name associated with the C&C detection | 
| %CALLBACK_ADDR% | URL, IP address, or email address to which a compromised host attempts a callback | 
| %COMPR_HOST% | Affected host or email address | 
| %CALLBACK_NUM% | Number of contacts made between callback addresses and compromised hosts | 
| %COMPR_HOST_NUM% | Number of compromised hosts involved in the outbreak | 
| %CALLBACK_ADDR_NUM% | Number of callback addresses involved in the outbreak | 
 
		