Views:
This table details the Windows event log descriptions for StellarProtect.
Event ID
Level
Category
Event
Details
256
Information
System
Service started
 
257
Information
System
Policy applied successfully (Version: %version%)
 
258
Information
System
Patch applied
File Name: %file_name%
 
259
Information
System
Patching in progress
After the earlier-applied patch is completed, the system will automatically try to apply this patch: %deferred_file_name%.
513
Information
intelli_av
Application vault update was successful
 
514
Information
intelli_av
Real Time Scan enabled
 
515
Information
intelli_av
A scheduled scan started
 
516
Information
intelli_av
A scheduled scan ended
Folders scanned: %1
Symbolic links: %2
Regular files: %3
Files scanned: %4
Files passed: %5
Threats detected: %6
517
Information
intelli_av
A manually launched scan started
 
518
Information
intelli_av
A manually launched scan ended
Folders scanned: %1
Symbolic links: %2
Regular files: %3
Files scanned: %4
Files passed: %5
Threats detected: %6
519
Information
intelli_av
A scheduled scan enabled
Next scan will be on %NextScan%.
520
Information
intelli_av
A scheduled scan disabled
 
521
Information
intelli_av
A scan manually launched by local user started
 
522
Information
intelli_av
A scan manually launched by local user ended
Folders scanned: %1
Symbolic links: %2
Regular files: %3
Files scanned: %4
Files passed: %5
Threats detected: %6
523
Information
intelli_av
Incoming file detected malicious and quarantined successfully
File Path: %PATH%
File Hash: %STRING%
Threat Type: %STRING%
Threat Name: %STRING%
Quarantine Path: %PATH%
Reboot Required: %NEED_REBOOT%
524
Information
intelli_av
Local file detected malicious and quarantined successfully
File Path: %PATH%
File Hash: %STRING%
Threat Type: %STRING%
Threat Name: %STRING%
Quarantine Path: %PATH%
Reboot Required: %NEED_REBOOT%
525
Information
intelli_av
Malicious file execution detected. Infected executable file quarantined successfully
File Path: %PATH%
File Hash: %STRING%
Threat Type: %STRING%
Threat Name: %STRING%
Quarantine Path: %PATH%
Reboot Required: %NEED_REBOOT%
768
Information
anomaly_detect
Operations Behavior Anomaly Detection (Script Behavior) enabled
Mode: %Mode%
Level: %Level%
Learning time: %LearningTime% day(s)
769
Information
anomaly_detect
Script behavior added to baseline
Access User: %USERNAME%
ID: %ID%
Target Process: %PATH% %ARGUMENT%
Parent Process 1: %PATH% %ARGUMENT%
Parent Process 2: %PATH% %ARGUMENT%
Parent Process 3: %PATH% %ARGUMENT%
Parent Process 4: %PATH% %ARGUMENT%
770
Information
anomaly_detect
Script behavior excluded from baseline.
ID: %ID%
Target Process: %PATH% %ARGUMENT%
Parent Process 1: %PATH% %ARGUMENT%
Parent Process 2: %PATH% %ARGUMENT%
Parent Process 3: %PATH% %ARGUMENT%
Parent Process 4: %PATH% %ARGUMENT%
771
Information
anomaly_detect
Operations Behavior Anomaly Detection (User Login) enabled
Mode: %Mode%
Level: %Level%
Learning time: %LearningTime% day(s)
772
Information
anomaly_detect
Operations Behavior Anomaly Detection (Application Behavior) enabled
Mode: %Mode%
Level: %Level%
Learning time: %LearningTime% day(s)
773
Information
anomaly_detect
Login account added to baseline
Domain: %Domain%
Account: %Account%
Login Type: %LoginType%
Source IP: %IP%
774
Information
anomaly_detect
Login account excluded from baseline
Domain: %Domain%
Account: %Account%
Login Type: %LoginType%
Source IP: %IP%
775
Information
anomaly_detect
Application added to baseline
Application Path: %Path%
776
Information
anomaly_detect
Application excluded from baseline
Application Path: %Path%
784
Information
anomaly_detect
DLL Injection Prevention enabled
 
1280
Information
device_control
Device Control enabled
 
1281
Information
device_control
USB device added into trusted device list
Vendor ID: %HEX%
Product ID: %HEX%
Serial Number: %STRING%
Type: permanent or one time
1282
Information
device_control
USB device removed from trusted device list
Vendor ID: %HEX%
Product ID: %HEX%
Serial Number: %STRING%
1283
Information
device_control
Trusted USB device connected
Vendor ID: %HEX%
Product ID: %HEX%
Serial Number: %STRING%
Active User: %STRING%
1284
Information
device_control
Trusted USB device disconnected
Vendor ID: %HEX%
Product ID: %HEX%
Serial Number: %STRING%
Active User: %STRING%
1792
Information
lockdown
File access allowed: %PATH%
Access Image Path: %PATH%
Access User: %USERNAME%
Mode: %MODE%
List: %LIST%
1793
Information
lockdown
A new file added to Approved List in Maintenance Mode.
Path: %PATH%
Hash: %SHA256_HEXSTR%
1794
Information
lockdown
The hash of an existing file in Approved List was updated in Maintenance Mode
Path: %PATH%
Hash: %SHA256_HEXSTR%
1795
Information
lockdown
Approved List initialization started
 
1796
Information
lockdown
Approved List initialization completed
Count: %COUNT%
1797
Information
lockdown
Application Lockdown enabled
Mode: %MODE%
1798
Information
lockdown
DLL/Driver Lockdown enabled
 
1799
Information
lockdown
Script Lockdown enabled
 
1800
Information
lockdown
Intelligent Runtime Learning enabled
 
2048
Information
update
Component update started
 
2049
Information
update
Component update ended
 
2050
Information
update
Scheduled component update enabled. Next update will be on %NEXT_UPDATE_LOCAL_TIME_STR% (agent's local system time).
 
2051
Information
update
Scheduled component update disabled
 
2052
Information
update
Components updated successfully.
Update Source: %UPDATE_URL%
[Original Version]
%COMPONENTS_INFO%
[Updated Version]
%COMPONENTS_INFO%
3840
Information
misc
User account enabled
 
3841
Information
misc
User account disabled
 
3842
Information
misc
User password changed
 
4352
Warning
system
Service stopped
 
4353
Warning
system
Unable to apply policy (Version: %version%)
 
4354
Warning
system
Unable to update file
Source Path: %src_path%
Destination Path: %dst_path%
Error Code: %err_code%
4355
Warning
system
Unable to apply patch
File Name: %file_name%
Error Code: %err_code%
4609
Warning
intelli_av
Incoming files scanned, action taken by Antivirus: %PATH%
Incoming files were scanned by antivirus. Action was taken according to settings.
File Path: %PATH%
File Hash: %STRING%
Threat Type: %STRING%
Threat Name: %STRING%
Action Result: %INTEGER%
Quarantine Path: %PATH%
4610
Warning
intelli_av
Incoming files scanned, action taken by Next-Generation Antivirus: %PATH%
Incoming files were scanned by next-generation antivirus. Action was taken according to settings.
File Path: %PATH%
File Hash: %STRING%
Threat Type: %STRING%
Threat Name: %STRING%
Action Result: %INTEGER%
Quarantine Path: %PATH%
4611
Warning
intelli_av
Local files scanned, action taken by Antivirus: %PATH%
Local files were scanned by antivirus. Action was taken according to settings.
File Path: %PATH%
File Hash: %STRING%
Threat Type: %STRING%
Threat Name: %STRING%
Action Result: %INTEGER%
Quarantine Path: %PATH%
4612
Warning
intelli_av
Local files scanned, action taken by Next-Generation Antivirus: %PATH%
Local files were scanned by next-generation antivirus. Action was taken according to settings.
File Path: %PATH%
File Hash: %STRING%
Threat Type: %STRING%
Threat Name: %STRING%
Action Result: %INTEGER%
Quarantine Path: %PATH%
4613
Warning
suspicious_objects
Suspicious program execution blocked
Suspicious program execution was blocked.
File Path: %PATH%
File Hash: %STRING%
4614
Warning
suspicious_objects
Suspicious program currently running
Suspicious program is currently running.
Process ID: %PID%
File Path: %PATH%
File Hash: %STRING%
File Credibility: %STRING%
4615
Warning
intelli_av
Application execution blocked by Antivirus
Application execution was blocked by antivirus.
Process Image Path: %PATH%
File Hash: %STRING%
Threat Type: %STRING%
Threat Name: %STRING%
4617
Warning
intelli_av
Application execution blocked by Next-Generation Antivirus
Application execution was blocked by next-generation antivirus.
Process Image Path: %PATH%
File Hash: %STRING%
Threat Type: %STRING%
Threat Name: %STRING%
4618
Warning
intelli_av
Failed to quarantine incoming file detected malicious
File Path: %PATH%
File Hash: %STRING%
Threat Type: %STRING%
Threat Name: %STRING%
4619
Warning
intelli_av
Failed to quarantine local file detected malicious
File Path: %PATH%
File Hash: %STRING%
Threat Type: %STRING%
Threat Name: %STRING%
4620
Warning
intelli_av
Malicious file execution detected. Failed to quarantine the infected executable file
File Path: %PATH%
File Hash: %STRING%
Threat Type: %STRING%
Threat Name: %STRING%
4864
Warning
anomaly_detect
Operations Behavior Anomaly Detection (Script Behavior) disabled
 
4865
Warning
anomaly_detect
Script Behavior allowed by Operations Behavior Anomaly Detection: %PATH% %ARGUMENT%
Access User: %USERNAME%
Parent Process 1: %PATH% %ARGUMENT%
Parent Process 2: %PATH% %ARGUMENT%
Parent Process 3: %PATH% %ARGUMENT%
Parent Process 4: %PATH% %ARGUMENT%
Mode: %Mode%
Level: %LEVEL%
4866
Warning
anomaly_detect
Script Behavior blocked by Operations Behavior Anomaly Detection:%PATH% %ARGUMENT%
Access User: %USERNAME%
Parent Process 1: %PATH% %ARGUMENT%
Parent Process 2: %PATH% %ARGUMENT%
Parent Process 3: %PATH% %ARGUMENT%
Parent Process 4: %PATH% %ARGUMENT%
Mode: %Mode%
Level: %LEVEL%
4867
warning
anomaly_detect
Operations Behavior Anomaly Detection (User Login) disabled
 
4868
warning
anomaly_detect
Operations Behavior Anomaly Detection (Application Behavior) disabled
 
4869
warning
anomaly_detect
A user login failure detected by Operations Behavior Anomaly Detection
Domain: %Domain%
Account: %Account%
Login Type: %LoginType%
Source IP: %IP%
4870
warning
anomaly_detect
An abnormal user login detected by Operations Behavior Anomaly Detection
Domain: %Domain%
Account: %Account%
Login Type: %LoginType%
Source IP: %IP%
4871
warning
anomaly_detect
Suspicious application behavior detected by Operations Behavior Anomaly Detection
Program Path: %Path%
Program Hash: %SHA256%
Program Size: %Size%
Certificate: %CertificateSigner%
Vendor: %VendorName%
Product: %Product%
4872
warning
anomaly_detect
An unrecognized application detected by Operations Behavior Anomaly Detection
PID: %PID%
Program Path: %Path%
Program Hash: %SHA256%
Program Size: %Size%
Certificate: %CertificateSigner%
Vendor: %VendorName%
Product: %Product%
4873
warning
anomaly_detect
Malicious application behavior detected by Operations Behavior Anomaly Detection
Program Path: %Path%
Program Hash: %SHA256%
Program Size: %Size%
Certificate: %CertificateSigner%
Vendor: %VendorName%
Product: %Product%
4880
Warning
anomaly_detect
DLL Injection Prevention disabled
 
4881
Warning
anomaly_detect
DLL Injection Prevention blocked: %OBJ_PATH%
Threat Image Path: %SUBJ_PATH%
Threat User: %USER%
5120
Warning
change_control
Change to an ICS file blocked by OT Application Safeguard.
Blocked Process: %PATH%
Target File: %PATH%
5376
Warning
device_control
Device Control disabled
 
5377
Warning
device_control
USB access blocked: %PATH%
Access Image Path: %PATH%
Access User: %USERNAME%
Vendor ID: %HEX%
Product ID: %HEX%
Serial Number: %STRING%
5378
Warning
device_control
USB autorun.inf file blocked: %PATH%
 
5379
Warning
device_control
Untrusted USB device connected
Vendor ID: %HEX%
Product ID: %HEX%
Serial Number: %STRING%
Active User: %STRING%
5380
Warning
device_control
Untrusted USB device disconnected
Vendor ID: %HEX%
Product ID: %HEX%
Serial Number: %STRING%
Active User: %STRING%
5888
Warning
lockdown
File access allowed: %PATH%
Access Image Path: %PATH%
Access User: %USERNAME%
Mode: %MODE%
Reason: %ALLOWED_REASON%
File hash allowed: %SHA256_HEXSTR%%THROTTLING_INFO_MSG%
5889
Warning
lockdown
File access blocked: C:\object_file_path
Access Image Path: %PATH%
Access User: %USERNAME%
Mode: %MODE%
Reason: %BLOCKED_REASON%
File hash blocked: %SHA256_HEXSTR%%THROTTLING_INFO_MSG%
5890
Warning
lockdown
Unable to add to or update Approved List: %PATH%
 
5891
Warning
lockdown
Application Lockdown disabled
 
5892
Warning
lockdown
DLL/Driver Lockdown disabled
 
5893
Warning
lockdown
Script Lockdown disabled
 
5894
Warning
lockdown
Intelligent Runtime Learning disabled
 
5895
Warning
lockdown
Approved List initialization canceled
 
6144
Warning
update
Component update unsuccessful (%AU_ERROR_CODE%)
Update Source: %UPDATE_URL%
[Original Version]
%COMPONENTS_INFO%
[Updated Version]
%COMPONENTS_INFO%
8448
Critical
system
Protection stopped manually via protection stop button or CLI
 
8449
Critical
system
Protection resumed
%REASON% could be one of the followings:
  • Manualy via the protection resume button or CLI
  • Automatically after device reboot
8706
Critical
intelli_av
Real-Time Scan disabled
 
9216
Critical
change_control
Maintenance Mode started
 
9217
Critical
change_control
Maintenance Mode ended