Querying Agent Event Logs Parent topic

Querying refines the list of displayed agent event logs.

Procedure

  1. Go to Logs & ReportsAgent Events in the navigation at the top of the web console.
    The Agent Events screen appears.
  2. To filter by period, click the Time Period drop down and specify a criteria.
    Perform one of the following:
    • Click a listed time range.
    • Click Custom, specify a time range, and click Search.
  3. To filter by endpoints, click the All Endpoints drop down and specify a criteria.
    The following options are available:
    • Endpoint name: Type the beginning or all of an endpoint host name and click Search.
    • Group Name: Type the group name and click Search.
    • IP Address: Type the IPv4 address and click Search.
    • IP Range: Type the IPv4 address range and click Search.
    • Tag: Type all or part of the tag and click Search.
  4. To filter by events, click the All Events drop down and specify a criteria.
    The following options are available:
    • Event Type: Select a specific event and click Apply.
    • Source: Select Safe Lock or Portable Security as the event source.
    • Severity Level: Select Information or Warning as the event level.
    • Marked: Select Open or Closed.
    • Integrity Monitoring: Select File or folder or Registry key or value, and click Search. File or folder searches support partial string matching.
    • Blocked File: Select File name or File hash (SHA-1), and click Search. File name searches support partial string matching.
    • Malware Detection: Select All detections, Unsuccessful actions, Cleaned, Quarantined, Deleted, Ignored or Rolled back.
  5. The table displays only the entries that match the filters selected.