ITAnalyticsContentPackAdminGuide_SEP_v2_1
ITAnalyticsContentPackAdminGuide_SEP_v2_1
Version 2.1
IT Analytics Symantec Endpoint Protection Content Pack
Administrator Guide
Product version 2.1
Documentation version: 2
This document was last updated on: May 9, 2018.
Legal Notice
Copyright © 2018 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, the Checkmark Logo, Enterprise Vault, Compliance Accelerator, and Discovery
Accelerator are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other
countries. Other names may be trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required to provide attribution to
the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or
free software licenses. The License Agreement accompanying the Software does not alter any rights or
obligations you may have under those open source or free software licenses. Please see the Third Party Software
file accompanying this Symantec product for more information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and
decompilation/reverse engineering. No part of this document may be reproduced in any form by any means
without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE
EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION
SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE
FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN
THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR
12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software -
Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer
Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction
release, performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation, 350 Ellis Street, Mountain View, CA 94043
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical Support’s primary role is to respond to
specific queries about product features and functionality. The Technical Support group also creates content for
our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas
within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works
with Product Engineering and Symantec Security Response to provide alerting services and virus definition
updates.
Symantec’s support offerings include the following:
A range of support options that give you the flexibility to select the right amount of service for any size
organization
Telephone and/or Web-based support that provides rapid response and up-to-the-minute information
Upgrade assurance that delivers software upgrades
Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis
Premium service offerings that include Account Management Services
For information about Symantec’s support offerings, you can visit our Web site at the following URL:
www.symantec.com/business/support/
All support services will be delivered in accordance with your support agreement and the then-current enterprise
technical support policy.
Customer service
Customer service information is available at the following URL:
www.symantec.com/business/support/
Customer Service is available to assist with non-technical questions, such as the following types of issues:
Questions regarding product licensing or serialization
Product registration updates, such as address or name changes
General product information (features, language availability, local dealers)
Latest information about product updates and upgrades
Information about upgrade assurance and support contracts
Information about the Symantec Buying Programs
Advice about Symantec's technical support options
Nontechnical presales questions
Issues that are related to CD-ROMs, DVDs, or manuals
Contents
Chapter 1
About this guide
Foreword
IT Analytics complements and expands upon the reporting and analytics offered by Symantec Endpoint
Protection. The capabilities provided within the IT Analytics Symantec Endpoint Protection Content Pack allow
customers to extract maximum value from the data contained within their Symantec Endpoint Protection Manager
database(s). This product relies on a functional implementation of the IT Analytics Server version 2.1. The IT
Analytics Server is the underlying technology that serves as a foundation for all the IT Analytics Content Packs.
By implementing the IT Analytics Symantec Endpoint Protection Content Pack, you attain the following benefits:
Unified view of data from multiple Symantec Endpoint Protection Manager databases
Powerful on-the-fly forensic analysis through ad-hoc reports and charts, with pivot tables
Out-of-the-box visually informative KPI scorecards, dashboards, and reports
Replace time-consuming & complex custom reporting
For more information about the IT Analytics Server version 2.1 installation guidelines, refer to the IT Analytics
Server Administrator Guide. For more information about using the IT Analytics Portal, refer to the IT Analytics
Portal User Guide.
This document provides guidance on how to install the IT Analytics Symantec Endpoint Protection Content Pack
into an IT Analytics Server. For additional assistance with the deployment of IT Analytics, please contact Support.
Style Conventions
This guidance uses the style conventions that are described in the following table.
Element Meaning
Bold font Signifies characters typed exactly as shown, including commands, switches,
and file names. User interface elements also appear in bold.
Italic font Titles of books and other substantial publications appear in italic.
Adding a Connection
1. To configure connections to the Content Packs open the IT Analytics Portal in a browser at:
http://servername:port/ITAnalytics/, where servername is the name of the IT Analytics Server.
1. Clicking on the Setting button in the toolbar, navigate to Settings > Data Sources. Under the Symantec
Endpoint Protection Content Pack, you should see the following text:
2. To the right of that text, click the Settings button and then Add Connection to access the connection
wizard, then click Next.
3. On the Database Settings Page, enter the SQL Server Host Name and Database Name where the SEP
Manager database is being hosted and change the default port if necessary. Choose Windows
Authentication if your logged in account has the appropriate rights, or if you prefer use SQL Server
Authentication with the proper credentials.
4. Review the information on the Summary Page before clicking Next to create the connection.
5. Verify that the connection has been configured successfully and click Finish.
6. You can now install cubes and reports from the Symantec Endpoint Protection Content Pack. To do so,
please refer to the Cubes Installation and Reports Installation sections of this guide.
7. To add additional connections to other Symantec Endpoint Protection Databases, click the Settings button
to the right of the SEP Connections dropdown menu and select Add Connection. Follow steps 3 through 5
above to add an additional connection.
For more information about installing cubes and reports and processing cubes, please refer to the IT Analytics
Server Administrator Guide.
Removing a Connection
1. To remove connections to the Content Packs open the IT Analytics Portal and navigate to Settings > Data
Sources.
2. In the SEP Connections dropdown menu, select the connection you want to remove then click the Settings
button to the right and click Remove Connection.
3. Click OK to confirm the removal of that connection and the data sources page should refresh. Verify that
connection is no longer displaying on the data sources page.
Note that removing a data source connection does not remove the cubes or cube data (if cubes are already
installed and processed). However, if you have any processing jobs scheduled to run that utilize a connection that
has been deleted, the processing jobs will fail.
Cubes Installation
Now that a connection to the Symantec Endpoint Protection Manager database has been established, you will
need to install the cubes from the Symantec Endpoint Protection Content Pack.
1. Once the appropriate data source connections have been established, you can install cubes available from
the Content Packs you have already implemented. To install cubes in the IT Analytics Portal, navigate to
Settings > Cubes Installation.
2. Select the Symantec Endpoint Protection cubes you would like to install from the Not Installed section, or
click Select All to specify all available cubes. You can select multiple cubes by holding down CTRL or
SELECT and clicking on the cubes you want to install.
3. Click the Install to begin the installation the selected cubes.
4. You can monitor the progress of cube installation in the IT Analytics Event Viewer. When the status
message Cube install process has completed appears, click Close.
5. On the Cube Installation tab, review that the selected cubes now appear in the Installed section. Click the
Refresh button if necessary to ensure the latest update. Once installed, there should be a message next to
each cube that states they require processing.
Reports Installation
Similar to installing the cubes, the out-of-the-box reports and dashboards can also be installed from the Symantec
Endpoint Protection Content Pack.
Chapter 4
Content Pack Reporting Examples
This section is intended to provide step-by-step examples of using IT Analytics reporting specifically for the
Symantec Endpoint Protection Content Pack. Note that these examples do not cover all the reporting features of
the IT Analytics Portal. For more information about using the IT Analytics Portal, refer to the IT Analytics Portal
User Guide.
NOTE: To follow this example you must have IT Analytics Symantec Endpoint Protection Content Pack installed
on your system and all cubes must be processed. While this is just one example, you can apply similar
configuration tactics to create any cube views.
4. In the Field List section on the right, expand Measures (denoted by the icon) and then expand Client.
5. Click Client Count to select the measure value and drag it to the left-hand portion of the window, where it
states “Add measures from the field list to view data from this cube.” Measures, or totals, are the aggregate
summary counts for each cube. Alternatively, you can drag the Client Count measure into the Measures
window in the Cube View Configuration Section at the bottom of the screen.
6. From the Field List, expand the Client dimension (denoted by the icon) then click Client - Infected,
and drag it over the value cell for the Client Count measure you displayed in the previous step to display
these values across rows. This field indicates whether the computer is infected. Alternatively, you can drag
the Client – Infected dimension to the Rows window in the Cube View Configuration section.
7. From the Field List, expand the Computer dimension click Computer – Computer Name, and drag it in
between Client – Infected and Client Count in the cube viewer window. Alternatively, you can drag
Computer – Computer Name to the Rows window in the Cube View Configuration section, underneath
Client – Infected.
8. Because you already have an existing field (Client - Infected), you have the option to place the new field
before or after the existing field. Simply click on the column header and move it in front, or rearrange the
order in the Cube View Configuration section below. You can move the field to different places in order to
dynamically change how your data is presented.
9. From the Field List, click Client - Firewall Status, and then drag it over the Client Count header to display
values across columns. This field displays the status of the firewall. Alternatively, you can drag Client –
Firewall Status to the Columns window in the Cube View Configuration section.
10. From the Field List, click Client - Version, and drag it to the Filters window in the Cube View Configuration
section. This field displays the version of the SEP client installed. Dropping it into the Filter area allows you to
filter the report by client version.
11. To filter on a specific value, right-click on the Client – Version dimension in the Filters window and select
Manage Filters. Choose to include or exclude specific client versions by checking or unchecking specific
values, then click OK. The data in the cube view will refresh to reflect your filter selection.
12. Expand the Client - Infected row by clicking the plus sign (+) next to the ‘Yes’ or ‘No’ value. You can now
view which specific computers have an agent installed for the version you filtered on, and whether the
firewall is currently turned on.
Content Pack Reporting Examples 15
Example 2: Creating a Key Performance Indicator (KPI) with the Symantec Endpoint Protection Content Pack
NOTE: To follow this example you must have IT Analytics Symantec Endpoint Protection Content Pack installed
on your system and all cubes must be processed. While this is just one example, you can apply similar
configuration tactics to create other KPIs.
The steps below provide an example of creating KPIs for computers without active firewalls defined through the
SEP Clients cube. The example highlights how this procedure automatically populates some of the MDX code
that is needed to define the KPI.
9. For this example, we will choose Percentage of a selected value with a goal of 100% since our goal is to
have all machines with firewall enabled, then click Next.
10. We now need to choose a second value, which will represent the total number of machines in our
environment. Click Select Second Cell and then right-click the value for total Client Count and select Add
selected cell to new KPI definition. You should see a confirmation that the second cell was successfully
selected, then click Next.
11. For the status graphic, select Gauge – Ascending. You can leave the threshold values as is, or modify the
percentages as needed, then click Next.
12. (OPTIONAL) For the trend indicator, select Compare Current Period to Previous Period, then ensure the
following are filled out:
Date Attribute: Last Checkin Date - Date
Number of Days in Period Comparison: 30
Graphic: Standard Arrow – Ascending (this denotes that you want the trend to be going up, and as
such the arrow will be colored accordingly – red for decreasing, green for increasing)
13. To name the KPI, enter the following text: Percent of Computers with Firewall On, then click Next.
14. Review the KPI settings and if satisfied, click Next.
15. Verify the KPI has been saved successfully and click Finish to close the wizard.
16. On the left navigation menu, click Key Performance Indicators. The new KPI should now display in the list
under the SEP Clients cube, with the current value, goal and status graphic already defined.
For more information on additional features within the IT Analytics Portal, refer to the IT Analytics Portal User
Guide.
Chapter 5
Content Pack Description
Cubes
The following is a list of default cubes provided within the IT Analytics Symantec Endpoint Protection Content
Pack, with their associated fields and KPIs (if applicable) as reference.
Dimensions
Access Right
Administrator
Computer
Domain
Group
Server
Site
Measures
Administrator Count: The number of administrators.
Computer Count: The number of rights that are assigned to computers. For a given user, a computer can have
one of three rights: Read, Full, or No Access.
Group Count: The number of rights that a group has.
Dimensions
Agent Behavior Event Action
Agent Behavior Event Alert
Agent Behavior Event Caller Return Module
Agent Behavior Event Description
Agent Behavior Event Process Name
Agent Behavior Event Rule Name
Agent Behavior Event Send SNMP Trap
Agent Behavior Event Severity
Agent Behavior Event Test Mode
Agent Behavior Event Type
Agent Behavior Event User Name
Agent Behavior Event VAPI Name
Computer
Domain
Event Date
Group
Server
Site
Measures
Content Pack Description 18
Cubes
Contains the information about the Agent Security Events that the computers with the Symantec Endpoint
Protection client generated. Information specific to this cube includes the total number of events, how many
computers generated events, and details of those security events.
Dimensions
Agent Security Event Alert
Agent Security Event App Name
Agent Security Event Hack Type
Agent Security Event Local Host IP
Agent Security Event Location Name
Agent Security Event Network Protocol
Agent Security Event Remote Host IP
Agent Security Event Remote Host MAC
Agent Security Event Remote Host Name
Agent Security Event Send SNMP Trap
Agent Security Event Severity
Agent Security Event Traffic Direction
Agent Security Event Type
Agent Security Event User Name
Client
Computer
Domain
Event Date
Group
IPS Detection Event SID
IPS Detection Event Name
IPS Detection Event Type
Server
Site
Measures
Event Count: The number of events.
Computer Count: The number of computers.
Dimensions
Agent System Event Category
Agent System Event Send SNMP Trap
Agent System Event Severity
Agent System Event Source
Agent System Event Type
Computer
Domain
Event Date
Group
Server
Site
Content Pack Description 19
Cubes
Measures
Event Count: The number of events.
Computer Count: The number of computers.
Dimensions
Agent Traffic Event Alert
Agent Traffic Event Application Name
Agent Traffic Event Blocked
Agent Traffic Event Local Port
Agent Traffic Event Location Name
Agent Traffic Event Network Protocol
Agent Traffic Event Remote Host IP
Agent Traffic Event Remote Port
Agent Traffic Event Rule Name
Agent Traffic Event Send SNMP Trap
Agent Traffic Event Severity
Agent Traffic Event Traffic Direction
Agent Traffic Event Type
Agent Traffic Event User Name
Computer
Domain
Event Date
Group
Server
Site
Measures
Event Count: The number of events.
Computer Count: The number of computers.
Dimensions
Alert
Alert Date
Computer
Domain
Group
Server
Site
Virus
Measures
Alerts: The number of alerts that match the given criteria.
Computers: The number of computers that match the given criteria.
Viruses: The number of viruses that match the given criteria.
Blocked: The number of viruses that were blocked that match the given criteria.
Cleaned: The number of viruses that were cleaned that match the given criteria.
Deleted: The number of viruses that were deleted that match the given criteria.
Quarantined: The number of viruses that were quarantined that match the given criteria.
Suspicious: The number of suspicious viruses that were detected that match the given criteria.
Content Pack Description 20
Cubes
Dimensions
AntiVirus Policy
Client
Computer
Domain
Download Advisor
Global Scan Options
Group
Last Checkin Date
Location
Mac Admin Defined Common
Mac Admin Defined Scans
Mac Auto Protect
Mac Miscellaneous
Server
Site
Sonar Settings
Virus Definition
Windows Admin Defined Advanced
Windows Admin Defined Scans
Windows Auto Protect
Windows Miscellaneous
Measures
Computer Count: The number of computers.
Group Count: The number of groups.
Dimensions
Application and Device Control Policy
Application and Device Control Rule
Blocked Device
Blocked Target
Client
Computer
Domain
Excluded Device
Group
Last Checkin Date
Location
Server
Site
Virus Definition
Measures
Computer Count: The number of computers.
Group Count: The number of groups.
Content Pack Description 21
Cubes
Dimensions
Client
Computer
Creation Date
Domain
Group
Intrusion Prevention Signature
Last Checkin Date
Last Scan Date
Last Virus Date
Security Virtual Appliance
Server
Site
Virus Definition
Measures
Client Count: The number of Symantec Endpoint Protection clients that match the given criteria.
Dimensions
Client
Computer
Domain
Event Action Taken
Event Date
Event Description
Event Detection
Event Direction
Event Local IP Address
Event Remote IP Address
Event Time
Group
Protection Technology
Server
Site
Measures
Client Count: The number of Symantec Endpoint Protection clients that match the given criteria.
Event Count: The number of events.
Dimensions
Client
Content Pack Description 22
Cubes
Client Restrictions
Computer
Domain
Exception Item
Exception Policy
Group
Last Checkin Date
Location
Server
Site
Virus Definition
Measures
Computer Count: The number of computers.
Group Count: The number of groups.
Dimensions
Client
Computer
Domain
Firewall Policy
Firewall Policy Rule
Group
Last Checkin Date
Location
Security Settings
Server
Site
Virus Definition
Measures
Computer Count: The number of computers.
Group Count: The number of groups.
Rule Count: The number of firewall rules.
Dimensions
Client
Computer
Domain
Event Date
Group
Host Integrity Check Action
Host Integrity Check Criteria
Host Integrity Check Description
Host Integrity Check Result
Host Integrity Check Rule Name
Content Pack Description 23
Cubes
Measures
Checks Failed: The number of Host Integrity checks that failed.
Checks Passed: The number of groups.
Host Integrity Check Count: Total number of Host Integrity checks.
Passed Count: The number of Host Integrity policies passed.
Failed Count: The number of Host Integrity policies failed.
Event Count: The number of Host Integrity events.
Computer Count: The number of computers.
Dimensions
Advanced
Client
Computer
Domain
Group
Host Integrity Policy
Last Checkin Date
Location
Requirement
Server
Site
Virus Definition
Measures
Computer Count: The number of computers that are subject to the policies.
Group Count: The number of groups.
Dimensions
Alert
Alert Date
Computer
Domain
Group
Insight Detection
Server
Site
Content Pack Description 24
Cubes
Virus
Measures
Computer Count: The number of computers that are subject to the policies.
Detection Count: The number of detections.
Risk Count: The number of risks.
Dimensions
Client
Computer
Domain
Group
Intrusion Prevention Policy
Last Checkin Date
Location
Server
Site
Virus Definition
Measures
Computer Count: The number of computers that are subject to the policies.
Group Count: The number of groups.
Dimensions
Client
Computer
Domain
Explicit GUP Mapping
Group
Last Checkin Date
LiveUpdate Policy
Location
Mac Advanced
Mac LiveUpdate Server
Mac Schedule
Mac Server Settings
Proxy Settings
Server
Site
Virus Definition
Windows Advanced
Windows LiveUpdate Server
Windows Schedule
Windows Server Settings
Measures
Content Pack Description 25
Cubes
Computer Count: The number of computers that are subject to the policies.
Group Count: The number of groups.
Dimensions
Client
Computer
Domain
Group
Last Checkin Date
Location
Policy
Server
Site
Virus Definition
Measures
Computer Count: The number of computers that are subject to the policies.
Group Count: The number of groups.
Dimensions
Computer
Domain
Group
Scan Client User
Scan Start Date
Server
Site
Status
Measures
Computers: The total number of computers that were scanned that match the given criteria.
Duration: The total duration to complete a scan that matched the given criteria.
Infected: The total number of infections that were detected that matched the given criteria.
Omitted: The total number of files that were omitted from the scans that matched the given criteria.
Scans: The total number of scans that were performed that matched the given criteria.
Threats: The total number of threats that were detected that matched the given criteria.
Total Files: The total number of files that were scanned that matched the given criteria.
Dimensions
Creation Date
Content Pack Description 26
Cubes
Domain
Group
Last Checkin Date
Last Reboot Date
Security Virtual Appliance
Server
Site
Measures
SVA Count: The number of Security Virtual Appliances.
Client Count: The number of clients connected to SVAs
Shared Insight Cache Size: The size of the Shared Insight Cache
Shared Insight Request Count: The number of Shared Insight requests
Shared Insight Submit Count: The number of submits to the Shared Insight Cache
Dimensions
Domain
Event Date
Server
Server Admin Event Admin Name
Server Admin Event Description
Server Admin Event Error Code
Server Admin Event Message ID
Server Admin Event Severity
Server Admin Event Type
Site
Measures
Event Count: The number of events.
Dimensions
Domain
Event Date
Server
Server System Event Error Code
Server System Event Message ID
Server System Event Severity
Server System Event Type
Site
Measures
Event Count: The number of events.
Dimensions
Alert
Content Pack Description 27
Reports
Alert Date
Computer
Domain
Group
Server
Site
SONAR Detection
Virus
Measures
Detection Count: The number of detections.
Risk Count: The number of risks.
Computer Count: The number of computers.
Reports
The following is a list of default reports provided within the IT Analytics Symantec Endpoint Protection Content
Pack, with their associated descriptions as reference.
Scan Trend
Displays a count of computers, scans, threats, and the total files that were scanned over time in a table form. It
also includes a graphical trend of computers, scans, and threats for a designated period of time.
Dashboards
The following is a list of default dashboards provided within the IT Analytics Symantec Endpoint Protection
Content Pack, with their associated description as reference.
Dimension Attributes
The following is a list of default cube dimensions and their associated attributes provided within the IT Analytics
Symantec Endpoint Protection Content Pack, as reference.
EP Access Right
EP Access Right contains the following dimension attributes:
Access Right - Type
EP Administrator
EP Administrator contains the following dimension attributes:
Administrator - Account Name
Administrator - Authentication Method
Administrator - Domain
Administrator - Full Name
Administrator - Status
Administrator - Type
Administrator - User Name
Content Pack Description 30
Dimension Attributes
Content Pack Description 31
Dimension Attributes
Content Pack Description 32
Dimension Attributes
EP Alert
EP Alert contains the following dimension attributes:
Alert - Actual Action
Alert – Detection Method
Alert - File Path
Alert - Requested Action
Alert - Secondary Action
Alert - Source
Alert - User Name
Alert - Virus Type
EP Alert Date
EP Alert Date contains the following dimension attributes:
Alert Date – Date
Alert Date – Date Range
Content Pack Description 33
Dimension Attributes
EP AntiVirus Policy
EP AntiVirus Policy contains the following dimension attributes:
AntiVirus Policy - Description
AntiVirus Policy - Enabled
AntiVirus Policy - Name
Content Pack Description 36
Dimension Attributes
EP Blocked Device
EP Blocked Device contains the following dimension attributes:
Blocked Device – Name
EP Blocked Target
EP Blocked Target contains the following dimension attributes:
Blocked Target – Name
EP Client
EP Client contains the following dimension attributes:
Client - Antivirus Engine Status
Client - Auto-Protect Status
Client – Deployment Message
Client – Deployment Running Version
Client – Deployment Status
Client – Deployment Target Version
Client - Firewall Status
Client - Free Disk
Client - Free Memory
Client – Group Update Provider
Client - Host Integrity Status
Client - Infected
Client - Major Version
Client - Minor Version
Client - Online Status
Client - Profile Serial Number
Client - Profile Version
Client - Reboot Required
Client – Shared Insight Cache Status
Client - Tamper Protection Status
Client - Time Zone
Client - Type
Client - Version
EP Computer
EP Computer contains the following dimension attributes:
Computer - BIOS Version
Computer - Computer Name
Computer - Current Login User
Computer - DHCP Server
Computer - Disk Drive
Computer - Disk Total
Computer - DNS Server
Computer - Domain
Computer - IP Address
Computer - Memory Total
Computer - Operating System
Computer - OS Language
Computer - Processor Clock Speed
Computer - Processor Count
Computer - Processor Type
Computer – Resource Manager URL
Computer - Service Pack
Computer - TPM Device
Computer – Virtual
Computer – Virtual Vendor
Computer - WINS Server
Content Pack Description 37
Dimension Attributes
EP Creation Date
EP Creation Date contains the following dimension attributes:
Creation Date – Date
Creation Date – Date Range
Creation Date - Day of Week
Creation Date - Month
Creation Date – Quarter
Creation Date – Week Number
Creation Date - Year
EP Domain
EP Domain contains the following dimension attributes:
Domain
EP Event Date
EP Event Date contains the following dimension attributes:
Event Date – Date
Event Date – Date Range
Event Date - Day of Week
Event Date - Month
Event Date – Quarter
Event Date – Week Number
Event Date - Year
EP Event Description
EP Event Description contains the following dimension attributes:
Event - Description
EP Event Detection
EP Event Detection contains the following dimension attributes:
Event – Detection
EP Event Direction
EP Event Direction contains the following dimension attributes:
Event – Direction
EP Event Time
EP Event Time contains the following dimension attributes:
Event – Hour
Event – Minute
Event – Second
Event - Time
EP Exception Item
EP Exception Item contains the following dimension attributes:
Exception Item - Action
Exception Item - Platform
Exception Item - Type
Exception Item - Value
EP Exception Policy
EP Exception Policy contains the following dimension attributes:
Exception Policy - Description
Exception Policy - Enabled
Exception Policy - Name
EP Excluded Device
EP Excluded Device contains the following dimension attributes:
Excluded Device - Name
EP Firewall Policy
EP Firewall Policy contains the following dimension attributes:
Firewall Policy - Description
Firewall Policy - Enabled
Firewall Policy - Name
EP Group
EP Group contains the following dimension attributes:
Group
Content Pack Description 39
Dimension Attributes
EP Insight Detection
EP Insight Detection contains the following dimension attributes:
Insight Detection - Application
Insight Detection - Application Version
Insight Detection - Company
Insight Detection - Detection Reason
Insight Detection - Domain
Insight Detection - File Path
Insight Detection - Risk
Insight Detection - Sensitivity
Insight Detection - URL
Insight Detection - User
Insight Detection - Whitelist Reason
Content Pack Description 41
Dimension Attributes
Content Pack Description 42
Dimension Attributes
Content Pack Description 43
Dimension Attributes
EP Location
EP Location contains the following dimension attributes:
Location - Description
Location - Name
EP Policy
EP Policy contains the following dimension attributes:
Policy - Description
Policy - Enabled
Policy - Name
Policy - Type
EP Protection Technology
EP Protection Technology contains the following dimension attributes:
Event – Protection Technology
EP Scan Status
EP Scan Status contains the following dimension attributes:
Scan – Status
Content Pack Description 44
Dimension Attributes
EP Server
EP Server contains the following dimension attributes:
Server
EP Site
EP Site contains the following dimension attributes:
Site
EP SONAR Detection
EP SONAR Detection contains the following dimension attributes:
SONAR Detection - Application Name
SONAR Detection - Application Version
SONAR Detection - Company
SONAR Detection - File Path
SONAR Detection - Risk
SONAR Detection - Score
Content Pack Description 45
Dimension Attributes
EP Virus
EP Virus contains the following dimension attributes:
Virus - Name
Virus - Risk Category
Virus - Threat Location
Virus - Threat Type
EP Virus Definition
EP Virus Definition contains the following dimension attributes:
Virus Definition - Content Type
Virus Definition - Date
Virus Definition - Revision
Virus Definition - Sequence Number
Virus Definition - Version