Views:
This table lists the server event log descriptions for StellarProtect (Legacy Mode).
ID
Server Event
Description
1011
Unable to send reports
Unable to send scheduled reports to %email_address%.
1012
Unable to send notifications
Unable to send notifications to %email_address%.
3001
Purge agent event logs - automatic
Automatic purge of agent event logs.
3002
Purge agent event logs - manual
Manual purge of agent event logs.
3004
Purge server event logs - automatic
Automatic purge of server event logs.
3005
Purge server event logs - manual
Manual purge of server event logs.
4001
Take action on unapproved blocked file
Request sent to endpoint(s): Add blocked file to Approved List.
File name: %file_name%
File hash: %file_hash% (SHA-1)
Request sent to endpoint(s): Delete the blocked file.
File name: %file_name%
File hash: %file_hash% (SHA-1)
Request sent to endpoint(s): Ignore the blocked file.
File name: %file_name%
File hash: %file_hash% (SHA-1)
Request sent to endpoint(s): Quarantine the file.
File name: %file_name%
File hash: %file_hash% (SHA-1)
Request sent to endpoint(s): Restore the file from quarantine.
File name: %file_name%
File hash: %file_hash% (SHA-1)
4004
Release the quarantined malicious file
Request sent to endpoint(s): Restore the file from quarantine.
File name: %file_name%
File hash: %file_hash% (SHA-1)
4005
Delete the quarantined malicious file
Request sent to endpoint(s): Delete the file from quarantine.
File name: %file_name%
File hash: %file_hash% (SHA-1)
4006
Take action on unapproved fileless attack
Request sent to endpoint(s): Add blocked process chain and command argument.
Process chain: %process_name%
Command argument: %parameter%
Request sent to endpoint(s): Ignore blocked process chain and command argument.
Process chain: %process_name%
Command argument: %parameter%
4100
Login Account Added to Baseline
A user login account has been added to the Situational Awareness baseline.
Domain:%domain%
Account:%account%
Login type:%logon_type%
Source IP:%source_ip%
4101
Application Added to Baseline
An application has been added to the Situational Awareness baseline.
Application Path: %app_path%
5001
Turn Application Lockdown on
Turned Application Lockdown on for endpoint(s).
5002
Turn Application Lockdown off
Turned Application Lockdown off for endpoint(s).
5011
Add trusted file hashes
Added 1 trusted file hash to endpoint(s).
Added %num% trusted file hashes to endpoint(s).
5013
Delete approved files
Removed specified items from the Approved List on endpoint(s) using SLtasks.exe.
5021
Block access from storage devices
Blocked access from storage devices on endpoint(s).
5023
Allow access from storage devices
Allowed access from storage devices on endpoint(s).
5025
Add trusted USB device on selected endpoint(s)
Add trusted USB device on selected endpoint(s)
5601
Export agent settings
Exported (%file_desc%) from %endpoint_name%.
5602
Import agent settings
Imported (%file_desc%) to endpoint(s).
5700
Scan for malware
Scanned endpoint(s) for malware.
5701
Update agent components
Updated agent components on endpoint(s).
5800
Change agent administrator password
Changed password on endpoint(s).
5900
Update agent Approved List
Updated Approved List on endpoint(s).
6001
Deploy agent patch
Deploy agent patch to endpoint(s).
Patch name: %patch_name%
6101
Agent transferred to new StellarOne server
Agent transferred to new StellarOne server
6201
Turn Maintenance Mode on
Turned Maintenance Mode on for endpoint(s).
6202
Turn Maintenance Mode off
Turned Maintenance Mode off for endpoint(s).
6301
Deploy group policy
Deploy group policy.
Version: %version%.
6401
Set Intelligent Runtime Learning
Set Intelligent Runtime Learning.
Version: %policy_version%
6402
Set Agent Password
Set Agent Password.
Version: %policy_version%
6403
Set Schedule Scan Setting
Set Schedule Scan Setting.
Version: %policy_version%
6404
Set User-Defined Suspicious Objects
Set User-Defined Suspicious Objects.
Version: %policy_version%
6405
Set Agent Patch
Set Agent Patch.
Version: %policy_version%