Alerts - Protection ViolationThe Alerts - Protection Violation page triggers an alert when a file is changed or access violation detected on a managed machine. Options include Distributed file changed on agent and was updated, File access violation detected, and Network access violation detected. Prerequisites
Passing Alert Information to Emails and Scripts
Note: Changing this email alarm format changes the format for all The following variables can be included in your formatted email alerts and in scripts.
Apply Click Apply to apply alert parameters to selected machine IDs. Confirm the information has been applied correctly in the machine ID list. Clear Click Clear to remove all parameter settings from selected machine IDs. Create Alarm If checked and an alarm condition is encountered, an alarm is created. Alarms are displayed in Monitor > Dashboard List, Monitor > Alarm Summary and Reports > Logs > Alarm Log. Create Ticket If checked and an alarm condition is encountered, a ticket is created. Run Script If checked and an alarm condition is encountered, a script is run. You must click the select script link to choose a script to run. You can optionally direct the script to run on a specified range of machine IDs by clicking this machine ID link. These specified machine IDs do not have to match the machine ID that triggered the alarm condition. Email Recipients If checked and an alarm condition is encountered, an email is sent to the specified email addresses.
Distributed file changed on agent and was updated If checked, an alert is triggered when a file distributed using Script > Distributed File is changed on the managed machine. The agent verifies the distributed file at every full check-in. File access violation detected If checked, an alert is triggered when an attempt is made to access a file specified as blocked using Audit > File Access. Network access violation detected If checked, an alert is triggered when an attempt is made to access either an internal or external internet site using an application specified as blocked using Audit > Network Access. Select All/Unselect All Click the Select All link to check all rows on the page. Click the Unselect All link to uncheck all rows on the page. Check-in status These icons indicate the agent check-in status of each managed machine: Agent has checked in Agent has checked in and user is logged on. Tool tip lists the logon name. Agent has not recently checked in Agent has never checked in Online but waiting for first audit to complete The agent is online but remote control is disabled The agent has been suspended Edit Icon Click a row's edit icon to populate header parameters with values from that row. You can edit these values in the header and re-apply them. Machine.Group ID The list of Machine ID.Group IDs displayed is based on the Machine ID / Group ID filter and the machine groups the administrator is authorized to see using System > Group Access. ATSE The ATSE response code assigned to machine IDs or SNMP devices:
Email Address A comma separated list of email addresses where notifications are sent. | |||||||||||||||||||||||||||
Topic 4247: Send Feedback. Download a PDF of this online book from the first topic in the table of contents. |