Symantec™ Endpoint
Protection Manager
Database Schema Reference
For Symantec Endpoint Protection and
Symantec Network Access Control
Symantec™ Endpoint Protection Manager Database
Schema Reference
The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.
Documentation version 11.00.02.00.00
Legal Notice
Copyright © 2008 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, LiveUpdate, Sygate, Symantec AntiVirus, Bloodhound,
Confidence Online, Digital Immune System, Norton, and TruScan are trademarks or
registered trademarks of Symantec Corporation or its affiliates in the U.S. and other
countries. Other names may be trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required
to provide attribution to the third party (“Third Party Programs”). Some of the Third Party
Programs are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under
those open source or free software licenses. Please see the Third Party Legal Notice Appendix
to this Documentation or TPIP ReadMe File accompanying this Symantec product for more
information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
20330 Stevens Creek Blvd.
Cupertino, CA 95014
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical
Support’s primary role is to respond to specific queries about product features
and functionality. The Technical Support group also creates content for our online
Knowledge Base. The Technical Support group works collaboratively with the
other functional areas within Symantec to answer your questions in a timely
fashion. For example, the Technical Support group works with Product Engineering
and Symantec Security Response to provide alerting services and virus definition
updates.
Symantec’s maintenance offerings include the following:
■ A range of support options that give you the flexibility to select the right
amount of service for any size organization
■ Telephone and Web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade assurance that delivers automatic software upgrade protection
■ Global support that is available 24 hours a day, 7 days a week
■ Advanced features, including Account Management Services
For information about Symantec’s Maintenance Programs, you can visit our Web
site at the following URL:
www.symantec.com/techsupp/
Contacting Technical Support
Customers with a current maintenance agreement may access Technical Support
information at the following URL:
www.symantec.com/techsupp/
Before contacting Technical Support, make sure you have satisfied the system
requirements that are listed in your product documentation. Also, you should be
at the computer on which the problem occurred, in case it is necessary to replicate
the problem.
When you contact Technical Support, please have the following information
available:
■ Product release level
■ Hardware information
■ Available memory, disk space, and NIC information
■ Operating system
■ Version and patch level
■ Network topology
■ Router, gateway, and IP address information
■ Problem description:
■ Error messages and log files
■ Troubleshooting that was performed before contacting Symantec
■ Recent software configuration changes and network changes
Licensing and registration
If your Symantec product requires registration or a license key, access our technical
support Web page at the following URL:
www.symantec.com/techsupp/
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Customer Service is available to assist with the following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and maintenance contracts
■ Information about the Symantec Buying Programs
■ Advice about Symantec's technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs or manuals
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement,
please contact the maintenance agreement administration team for your region
as follows:
Asia-Pacific and Japan contractsadmin@symantec.com
Europe, Middle-East, and Africa semea@symantec.com
North America and Latin America supportsolutions@symantec.com
Additional enterprise services
Symantec offers a comprehensive set of services that allow you to maximize your
investment in Symantec products and to develop your knowledge, expertise, and
global insight, which enable you to manage your business risks proactively.
Enterprise services that are available include the following:
Symantec Early Warning Solutions These solutions provide early warning of cyber attacks, comprehensive threat
analysis, and countermeasures to prevent attacks before they occur.
Managed Security Services These services remove the burden of managing and monitoring security devices
and events, ensuring rapid response to real threats.
Consulting Services Symantec Consulting Services provide on-site technical expertise from
Symantec and its trusted partners. Symantec Consulting Services offer a variety
of prepackaged and customizable options that include assessment, design,
implementation, monitoring, and management capabilities. Each is focused on
establishing and maintaining the integrity and availability of your IT resources.
Educational Services Educational Services provide a full array of technical training, security
education, security certification, and awareness communication programs.
To access more information about Enterprise services, please visit our Web site
at the following URL:
www.symantec.com
Select your country or language from the site index.
Contents
Technical Support ............................................................................................... 4
Chapter 1 Database schema overview ............................................... 15
About the Symantec Endpoint Protection Manager database
schema ................................................................................. 15
Chapter 2 Actual Action data table .................................................... 17
Actual Action schema .................................................................... 17
Chapter 3 Admin User data table ....................................................... 21
Admin User schema ...................................................................... 21
Chapter 4 Agent Behavior Logs data table ....................................... 23
Agent Behavior Logs schema .......................................................... 23
Chapter 5 Agent Packet Logs data table ........................................... 29
Agent Packet Logs schema ............................................................. 29
Chapter 6 Agent Security Logs data table ........................................ 33
Agent Security Logs schema ........................................................... 33
Chapter 7 Agent System Logs data table .......................................... 39
Agent System Logs schema ............................................................ 39
Chapter 8 Agent Traffic Logs data table ............................................ 49
Agent Traffic Logs schema ............................................................. 49
Chapter 9 Alert Filter data table ......................................................... 55
Alert Filter schema ....................................................................... 55
8 Contents
Chapter 10 Agent Status data table ..................................................... 59
Agent Status schema .................................................................... 59
Chapter 11 Alert Message data table ................................................... 61
Alert Message schema ................................................................... 61
Chapter 12 Alerts data table .................................................................. 63
Alerts schema .............................................................................. 63
Chapter 13 Anomaly Detection data table .......................................... 67
Anomaly Detection schema ............................................................ 67
Chapter 14 Anomaly Detection Operation data table ....................... 69
Anomaly Detection Operation schema .............................................. 69
Chapter 15 Anomaly Detections data table ........................................ 71
Anomaly Detections schema ........................................................... 71
Chapter 16 Anomaly Detection Type data table ................................. 73
Anomaly Detection Type schema ..................................................... 73
Chapter 17 Anomaly Remediation data table ..................................... 75
Anomaly Remediation schema ........................................................ 75
Chapter 18 Anomaly Remediation Operation data table ................. 77
Anomaly Remediation Operation schema .......................................... 77
Chapter 19 Anomaly Remediations data table ................................... 81
Anomaly Remediations schema ...................................................... 81
Chapter 20 Anomaly Remediation Type data table ........................... 83
Anomaly Remediation Type schema ................................................. 83
Chapter 21 Audit Report data table ...................................................... 85
Audit Report schema .................................................................... 85
Contents 9
Chapter 22 Basic Metadata data table ................................................. 89
Basic Metadata schema ................................................................. 89
Chapter 23 Behavior Report data table ............................................... 91
Behavior Report schema ................................................................ 91
Chapter 24 Binary File data table ......................................................... 95
Binary File schema ....................................................................... 95
Chapter 25 Command data table .......................................................... 97
Command schema ........................................................................ 97
Chapter 26 Command Report data table ........................................... 101
Command Report schema ............................................................. 101
Chapter 27 Compliance Report data table ........................................ 105
Compliance Report schema .......................................................... 105
Chapter 28 Computer Application data table ................................... 113
Computer Application schema ...................................................... 113
Chapter 29 Data Handler data table ................................................... 115
Data Handler schema .................................................................. 115
Chapter 30 Enforcer Client Logs 1 and 2 data tables ..................... 117
Enforcer Client Logs 1 and 2 schema .............................................. 117
Chapter 31 Enforcer Traffic Logs 1 and 2 data table ...................... 121
Enforcer Traffic Logs 1 and 2 schema ............................................. 121
Chapter 32 Enforcer System Logs 1 and 2 data tables ................... 125
Enforcer System Logs 1 and 2 schema ............................................. 125
Chapter 33 Firewall Report data table ............................................... 131
Firewall Report schema ................................................................ 131
10 Contents
Chapter 34 GUI Parameters data table .............................................. 135
GUI Parameters schema ............................................................... 135
Chapter 35 History data table .............................................................. 137
History schema .......................................................................... 137
Chapter 36 History Configuration data table .................................... 139
History Configuration schema ....................................................... 139
Chapter 37 Home Page Configuration data table ............................ 145
Home Page Configuration schema .................................................. 145
Chapter 38 HPP Alerts data table ........................................................ 147
HPP Alerts schema ..................................................................... 147
Chapter 39 HPP Application data table ............................................. 149
HPP Application schema .............................................................. 149
Chapter 40 Identity Map data table .................................................... 151
Identity Map schema ................................................................... 151
Chapter 41 Inventory Current Risk data table .................................. 153
Inventory Current Risk schema ..................................................... 153
Chapter 42 Inventory Current Virus data table ................................ 155
Inventory Current Virus schema .................................................... 155
Chapter 43 Inventory Report data table ............................................ 157
Inventory Report schema ............................................................. 157
Chapter 44 LAN Device Detected data table ..................................... 163
LAN Device Detected schema ........................................................ 163
Chapter 45 LAN Device Excluded data table ..................................... 165
LAN Device Excluded schema ........................................................ 165
Contents 11
Chapter 46 Legacy Agent data table ................................................... 167
Legacy Agent schema .................................................................. 167
Chapter 47 Local Metadata data table ............................................... 169
Local Metadata schema ................................................................ 169
Chapter 48 Log Configuration data table .......................................... 171
Log Configuration schema ............................................................ 171
Chapter 49 Network Scan data table .................................................. 175
Network Scan schema .................................................................. 175
Chapter 50 Network Scan Result data table ..................................... 177
Network Scan Result schema ........................................................ 177
Chapter 51 Notification data table ...................................................... 179
Notification schema .................................................................... 179
Chapter 52 Notification Alerts data table .......................................... 185
Notification Alerts schema ........................................................... 185
Chapter 53 Pattern data table .............................................................. 187
Pattern schema .......................................................................... 187
Chapter 54 Reports data table (not used) ......................................... 189
Reports schema .......................................................................... 189
Chapter 55 Scan Report data table ..................................................... 191
Scan Report schema .................................................................... 191
Chapter 56 Scans data table ................................................................ 195
Scans schema ............................................................................ 195
Chapter 57 SE Global data table .......................................................... 199
SE Global schema ....................................................................... 199
12 Contents
Chapter 58 SCF Inventory data table (not used) .............................. 201
SCF Inventory schema ................................................................. 201
Chapter 59 SEM Agent data table ....................................................... 203
SEM Agent schema ..................................................................... 203
Chapter 60 SEM Application data table ............................................. 213
SEM Application schema .............................................................. 213
Chapter 61 SEM Client data table ....................................................... 215
SEM Client schema ..................................................................... 215
Chapter 62 SEM Compliance Criteria data table ............................. 219
SEM Compliance Criteria schema .................................................. 219
Chapter 63 SEM Computer data table ................................................ 227
SEM Computer schema ................................................................ 227
Chapter 64 SEM Content data table ................................................... 231
SEM Content schema ................................................................... 231
Chapter 65 SEM Job data table ........................................................... 233
SEM Job schema ......................................................................... 233
Chapter 66 Serial Numbers data table ............................................... 237
Serial Numbers schema ............................................................... 237
Chapter 67 Server Admin Logs data tables ....................................... 239
Server Admin Logs 1 and 2 schema ................................................ 239
Chapter 68 Server Client Logs data tables ........................................ 245
Server Client Logs 1 and 2 schema ................................................. 245
Chapter 69 Server Enforcer Logs data tables ................................... 249
Server Enforcer Logs 1 and 2 schema .............................................. 249
Contents 13
Chapter 70 Server Policy Logs data tables ........................................ 255
Server Policy Logs 1 and 2 schema ................................................. 255
Chapter 71 Server System Logs data tables ..................................... 257
Server System Logs 1 and 2 schema ............................................... 257
Chapter 72 System Report data table ................................................ 261
System Report schema ................................................................ 261
Chapter 73 System State data table ................................................... 283
System State schema ................................................................... 283
Chapter 74 Threat Report data table .................................................. 285
Threat Report schema ................................................................. 285
Chapter 75 Version data table ............................................................. 291
Version schema .......................................................................... 291
Chapter 76 Virus data table .................................................................. 293
Virus schema ............................................................................. 293
Chapter 77 Virus Category data table ................................................ 299
Virus Category schema ................................................................ 299
Chapter 78 Database Schema Views .................................................. 301
Purposes of views ....................................................................... 301
14 Contents
Chapter 1
Database schema overview
This chapter includes the following topics:
■ About the Symantec Endpoint Protection Manager database schema
About the Symantec Endpoint Protection Manager
database schema
The Symantec Endpoint Protection Manager database stores all the information
that concerns the Symantec software and associated security information. The
information is stored in a series of tables, the database schema.
Data types represent the physical make up of the data.
The following types of data are used in the database:
■ bigint
■ char
■ datetime
■ int
■ nvarchar
■ tinyint
■ varbinary
■ varchar
Some data types include the physical length of the field in parentheses. For
example, char(24) indicates a character field with a length of 24 characters.
An asterisk (*) beside a field name indicates that the field acts as a Primary Key
in the tables. The Primary Key is a column or a set of columns that uniquely
identify all the rows in a table. Primary Keys may not contain null values. No two
16 Database schema overview
About the Symantec Endpoint Protection Manager database schema
rows can have the same Primary Key value; therefore, a Primary Key value always
uniquely identifies a single row. More than one key can uniquely identify rows in
a table, each of these keys is called a Candidate Key. Only one candidate can be
chosen as the Primary Key of a table; all other Candidate Keys are known as
Alternate Keys.
In a normalized table, all of a row's data values depend completely on the Primary
Key. For example, in a normalized employee table with EmployeeID as the Primary
Key, all columns should contain data that is related to a specific employee. The
table should not have a DepartmentName column because the name of the
department depends on a Department ID, not on an Employee ID.
Chapter 2
Actual Action data table
This chapter includes the following topics:
■ Actual Action schema
Actual Action schema
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ACTUALACTION.
Table 2-1 Actual Action schema
Database Field Name Comment Data Type
ACTUALACTION_IDX* Primary Key (one of 1…500 as shown) int, not null
18 Actual Action data table
Actual Action schema
Table 2-1 Actual Action schema (continued)
Database Field Name Comment Data Type
ACTUALACTION varchar(255), not
null
Actual Action data table 19
Actual Action schema
Table 2-1 Actual Action schema (continued)
Database Field Name Comment Data Type
A hard-coded English string that was used for the following
lookups:
-1 = Action invalid
1 = Quarantined
2 = Renamed
3 = Deleted
4 = Left alone
5 = Cleaned
6 = Cleaned or macros deleted
7 = Saved
9 = Moved back
10 = Renamed back
11 = Undone
12 = Bad
13 = Backed up
14 = Pending repair
15 = Partially repaired
16 = Process termination pending restart
17 = Excluded
18 = Restart processing
19 = Cleaned by deletion
20 = Access denied
21 = Process terminated
22 = No repair available
23 = All actions failed
98 = Suspicious
99 = Details pending
110 = Detected by using the commercial application list
111 = Forced detection by using the file name
1000 = Forced detection by using the file hash
20 Actual Action data table
Actual Action schema
Table 2-1 Actual Action schema (continued)
Database Field Name Comment Data Type
500 = Not applicable
Chapter 3
Admin User data table
This chapter includes the following topics:
■ Admin User schema
Admin User schema
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ADMINUSER.
Table 3-1 Admin User schema
Database Field Name Comment Data Type
USER_ID* Primary Key, Logon user ID. char(32), not null
USER_NAME The user name of the admin. nvarchar(255),
varchar(255), not null
DOMAIN_ID The GUID for the currently logged in domain. char(32), not null
AUTOREFRESH The user-defined auto refresh value for all logs (computer int, not null
status, notifications, scan, and so on).
LASTCHANGE The last time that the user accessed the console. int, not null
LASTSPMTIME The last time of a successful keep alive to application server. int, not null
22 Admin User data table
Admin User schema
Chapter 4
Agent Behavior Logs data
table
This chapter includes the following topics:
■ Agent Behavior Logs schema
Agent Behavior Logs schema
The Agent Behavior Logs data table is not used in Symantec Network Access
Control.
Table 4-1 describes the database schema for the Agent Behavior logs.
This schema has two tables. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_AGENT_BEHAVIOR_LOG_1_LOG_IDX or
I_AGENT_BEHAVIOR_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.
24 Agent Behavior Logs data table
Agent Behavior Logs schema
Table 4-1 Agent Behavior Logs 1 and 2 schema
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
GROUP_ID The GUID of the group to which the log belongs. char(32), not null
COMPUTER_ID The GUID of the client computer that is associated char(32), not null
with the agent log.
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
EVENT_ID An event ID from the Symantec Endpoint Protection int, not null
agent.
Possible values are as follows:
501 = Application Control Driver
502 = Application Control Rules
999 = Tamper Protection
EVENT_TIME The event-generated time (in GMT). bigint, not null
SEVERITY The seriousness of the event. int, not null
0 is most serious.
AGENT_ID The GUID of the agent. char(32), null
HARDWARE_KEY The hash of the computer hardware information. char(32), null
HOST_NAME The host name of client computer. nvarchar(256),
varchar(256), null
ACTION Possible values include the following: int, null
0 = allow
1 = block
2 = ask
3 = continue
4 = terminate
Agent Behavior Logs data table 25
Agent Behavior Logs schema
Table 4-1 Agent Behavior Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
TEST_MODE Was this rule run in test mode? int, null
0 = No, Else = Yes
DESCRIPTION The behavior that was blocked. nvarchar(256),
varchar(256), null
VAPI_NAME The API that was blocked. nvarchar(256),
varchar(256), null
ENCODED_API_NAME nvarchar(256),
varchar(256), null
BEGIN_TIME The start time of the security issue. bigint, null
END_TIME The end time of the security issue. End time is an bigint, null
optional field because Symantec may fail to detect the
exact end time of traffic, like UDP. In those cases, the
end time is equal to start time.
RULE_ID The ID of the rule that the event triggered. It is always char(32), null
0 if the rule ID is not specified in the security rule. The
field is helpful to security rule troubleshooting. If
multiple rules match, RULE_ID logs the rule that has
final decision on PacketProc (pass/block/drop).
RULE_NAME The name of the rule that the event triggered. It is nvarchar(256),
always an empty string if the rule name is not specified varchar(256), null
in the security rule. It is also used for troubleshooting.
In theory, the IT admin can know the rule by ID.
However, the name gives the user a direct view of the
rule that can be used.
CALLER_PROCESS_ID The ID of the process that triggers the logging. bigint, null
CALLER_PROCESS_NAME The full path name of the application that is involved. nvarchar(256),
It may be empty if the application is unknown, if the varchar(256), null
operating system is involved, or if no application is
involved. Also, it may be empty if the profile says “don’t
log the application name in the raw traffic log.”
CALLER_RETURN_ADDRESS The return address of the caller. This field allows the bigint, null
software to detect the calling module that makes the
API call.
26 Agent Behavior Logs data table
Agent Behavior Logs schema
Table 4-1 Agent Behavior Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
CALLER_RETURN_MODULE_NAME The module name of the caller. See the nvarchar(256),
“CallerReturnAddress” field for more information. varchar(256), null
PARAMETER The parameters that were used in the API call. Each nvarchar(256),
parameter was converted to STRING format and varchar(256), null
separated by one space character. Double quotation
characters within the string are escaped by a backslash
(\) character.
ALERT ALERT indicates whether this event is counted during int, null
alert notification processing at the server. ALERT is
true if Tamper Protection logs the event. It is false
otherwise.
Possible values are as follows:
True = 1
False = 0
SEND_SNMP_TRAP SEND_SNMP_TRAP reflects the send SNMP trap action. tinyint, null
SEND_SNMP_TRAP is true if send is true.
USER_NAME The logon user name. nvarchar(256),
varchar(256), null
DOMAIN_NAME The logon (Windows) domain name. nvarchar(256),
varchar(256), null
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260),
varchar(260), null
RESERVED_BINARY varbinary(2000),
null
REPETITION Event repetition due to aggregation (damper). int, not null
Agent Behavior Logs data table 27
Agent Behavior Logs schema
Table 4-1 Agent Behavior Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
LOG_IDX* The log index unique ID. char(32), null
28 Agent Behavior Logs data table
Agent Behavior Logs schema
Chapter 5
Agent Packet Logs data
table
This chapter includes the following topics:
■ Agent Packet Logs schema
Agent Packet Logs schema
The Agent Packet Logs data table is not used in Symantec Network Access Control.
Table 5-1 describes the database schema for the Agent Packet logs.
This schema has two tables. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_AGENT_PACKET_LOG_1_LOG_IDX or
I_AGENT_PACKET_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.
30 Agent Packet Logs data table
Agent Packet Logs schema
Table 5-1 Agent Packet Logs 1 and 2 schema
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
GROUP_ID The GUID of the group to which the log belongs. char(32), not null
COMPUTER_ID The GUID of the client computer that is associated with the char(32), not null
agent packet log.
TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
EVENT_ID An event ID from the Symantec Endpoint Protection agent. int, not null
401 = Raw Ethernet
EVENT_TIME The event-generated time (in GMT). bigint, not null
AGENT_ID The GUID of the agent. char(32), null
HARDWARE_KEY The hash of the computer hardware information. char(32), null
HOST_NAME The host name of the client computer. nvarchar(256),
varchar(256), null
LOCAL_HOST_IP The IP address of the local computer (IPv4). bigint, null
REMOTE_HOST_IP The IP address of the remote computer (IPv4). bigint, null
REMOTE_HOST_NAME The name of the remote computer. It may be empty if the nvarchar(64), varchar(64),
name resolution failed. null
LOCAL_PORT The TCP/UDP port in local computer (host byte-order). It is int, null
valid only on TSE_TRAFFIC_TCP and TSE_TRAFFIC_UDP.
Otherwise, it is always zero.
REMOTE_PORT The TCP/UDP port in remote computer (host byte-order). int, null
It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.
TRAFFIC_DIRECTION The direction of traffic. Enum (unknown = 0; inbound = 1; tinyint, null
outbound = 2)
Agent Packet Logs data table 31
Agent Packet Logs schema
Table 5-1 Agent Packet Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
BLOCKED Whether the traffic was blocked. tinyint, not null
Possible values are as follows:
Yes = 1
No = 0
APP_NAME The full path name of the application involved. It may be nvarchar(256),
empty if an unknown application is involved or if no varchar(256), null
application is involved. For example, the ping of death
denial-of-service attack doesn’t have an AppName because
it attacks the operating system.
ALERT ALERT reflects the alert attribute in the profile action. If int, null
the Network Threat Protection policy indicates that the
event should be considered for server-side notification
generation, the ALERT field is set to 1.
Possible values are as follows:
Yes = 1
No = 0
SEND_SNMP_TRAP SEND_SNMP_TRAP reflects the send SNMP trap action. tinyint, null
SEND_SNMP_TRAP is true if send is true.
Possible values are as follows:
Yes = 1
No = 0
EVENT_DATA Additional data in binary format. This field is optional. varbinary(2000), null
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260),
varchar(260), null
32 Agent Packet Logs data table
Agent Packet Logs schema
Table 5-1 Agent Packet Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
RESERVED_BINARY varbinary(2000), null
LOG_IDX* The log index unique ID. char(32), null
Chapter 6
Agent Security Logs data
table
This chapter includes the following topics:
■ Agent Security Logs schema
Agent Security Logs schema
Table 6-1 describes the database schema for the Agent Security logs.
This schema has two tables. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_AGENT_SECURITY_LOG_1_AGENT_SECURITY_LOG_IDX or
I_AGENT_SECURITY_LOG_2_AGENT_SECURITY_LOG_IDX. The
AGENT_SECURITY_LOG_IDX field serves as the table's unique identifier, but it
is not formally classified as the table's primary key. This field has an index on it,
but it is not the primary key index. This table has no primary key.
Table 6-1 Agent Security Logs 1 and 2 schema
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
34 Agent Security Logs data table
Agent Security Logs schema
Table 6-1 Agent Security Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
GROUP_ID The GUID of the group to which the log belongs. char(32), not null
COMPUTER_ID The GUID of the client computer that is associated with char(32), not null
the agent security log.
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
Agent Security Logs data table 35
Agent Security Logs schema
Table 6-1 Agent Security Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
EVENT_ID Compliance events: int, not null
209 = Host Integrity failed (TSLOG_SEC_NO_AV)
210 = Host Integrity passed (TSLOG_SEC_AV)
221 = Host Integrity failed but it was reported as PASS
237 = Host Integrity custom log entry
Firewall and IPS events:
207 = Active Response
211 = Active Response Disengaged
219 = Active Response Canceled
205 = Executable file changed
216 = Executable file change detected
217 = Executable file change accepted
218 = Executable file change denied
220 = Application Hijacking
201 = Invalid traffic by rule
202 = Port Scan
203 = Denial-of-service attack
204 = Trojan horse
206 = Intrusion Prevention System (Intrusion Detected,
TSLOG_SEC_INTRUSION_DETECTED)
208 = MAC Spoofing
Application and Device control:
238 = Device control disabled device
239 = Buffer Overflow Event
240 = Software protection has thrown an exception
EVENT_TIME The event-generated time (in GMT). bigint, not null
36 Agent Security Logs data table
Agent Security Logs schema
Table 6-1 Agent Security Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
SEVERITY The level of severity that is defined in Security Rule. int, not null
Possible values are as follows:
Critical = 0 - 3
Major = 4 - 7
Minor = 8 - 11
Info = 12 - 15
AGENT_ID The GUID of the agent. char(32), null
HARDWARE_KEY The hash of the computer hardware information. char(32), null
HOST_NAME The host name of the client computer. nvarchar(256),
varchar(256), null
LOCAL_HOST_IP The IP address of local computer (IPv4). bigint, null
REMOTE_HOST_IP The IP address of remote computer (IPv4). bigint, null
REMOTE_HOST_NAME The name of remote computer. It may be empty if the nvarchar(64),
name resolution failed. varchar(64), null
TRAFFIC_DIRECTION The direction of traffic. Enum (unknown = 0; inbound = tinyint, null
1; outbound = 2)
NETWORK_PROTOCOL The protocol type: Enum (OTHERS = 1; TCP = 2; UDP = 3; tinyint, null
ICMP = 4)
HACK_TYPE It is a reason if the Event ID is TSLOG_SEC_NO_AV. int, null
It is the intrusion ID if the Event ID is
TSLOG_SEC_INTRUSION_DETECTED.
It is additional information if event ID is TSLOG_SEC_AV.
Possible reasons are as follows:
Process is not running - Bit 0 is 1
Signature is out of date - Bit 1 is 1
Recovery was tried - Bit 2 is 1
BEGIN_TIME The start time of the security issue. bigint, null
Agent Security Logs data table 37
Agent Security Logs schema
Table 6-1 Agent Security Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
END_TIME The end time of the security issue. End time is an optional bigint, null
field because the software may fail to detect the exact end
time of traffic, like UDP. In those cases, the end time is
equal to the begin time.
REPETITION The number of attacks. When a hacker launches a mass int, null
attack, it may be damped to one event by the log system.
APP_NAME The full path of the application involved. It may be empty nvarchar(256),
if an unknown application is involved or if no application varchar(256), null
is involved. For example, the ping of death
denial-of-service attack doesn’t have an AppName because
it attacks the operating system itself.
EVENT_DESC A description of the event. Usually, the first line of the nvarchar(2000),
description is treated as “summary". varchar(4000), null
EVENT_DATA Additional data in binary format. This field is optional. varbinary(3000), null
ALERT ALERT reflects the alert attribute in profile action. If the tinyint, null
Network Threat Protection policy indicates that the event
should be considered for server-side notification
generation, the ALERT field is set to 1.
Possible values are as follows:
Yes = 1
No = 0
SEND_SNMP_TRAP SEND_SNMP_TRAP reflects the send SNMP trap action. tinyint, null
SEND_SNMP_TRAP is true if send is true.
Possible values are as follows:
Yes = 1
No = 0
LOCAL_HOST_MAC The MAC address of the local computer. varchar(18), null
REMOTE_HOST_MAC The MAC address of the remote computer. varchar(18), null
LOCATION_NAME The location that is used when the event occurs. nvarchar(256),
varchar(256), null
USER_NAME The logon user name. nvarchar(256),
varchar(256), null
38 Agent Security Logs data table
Agent Security Logs schema
Table 6-1 Agent Security Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
DOMAIN_NAME The logon domain name. nvarchar(256),
varchar(256), null
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260),
varchar(260), null
RESERVED_BINARY varbinary(1900), null
AGENT_SECURITY_LOG_IDX* The log index unique ID. char(32), null
Chapter 7
Agent System Logs data
table
This chapter includes the following topics:
■ Agent System Logs schema
Agent System Logs schema
Table 7-1 describes the database schema for the Agent System logs.
This schema has two tables. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_AGENT_SYSTEM_LOG_1_LOG_IDX or
I_AGENT_SYSTEM_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.
Table 7-1 Agent System Logs 1 and 2 schema
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
40 Agent System Logs data table
Agent System Logs schema
Table 7-1 Agent System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
GROUP_ID The GUID of the group to which the log belongs. char(32), not null
COMPUTER_ID The GUID of the client computer that is associated with the char(32), not null
agent system log.
TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
Agent System Logs data table 41
Agent System Logs schema
Table 7-1 Agent System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
EVENT_ID int, not null
42 Agent System Logs data table
Agent System Logs schema
Table 7-1 Agent System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
An event ID from the Symantec Endpoint Protection agent.
AGENT_SYSTEM_INSTALL_EVENT_TYPES = Installation
events:
Possible values include the following:
0x12070001 = Internal error
0x12070101 = Install complete
0x12070102 = Restart recommended
0x12070103 = Restart required
0x12070104 = Installation failed
0x12070105 = Uninstallation complete
0x12070106 = Uninstallation failed
0x12071037 = Symantec AntiVirus installed
0x12071038 = Symantec Firewall installed
0x12071039 = Uninstall
0x1207103A = Uninstall rolled-back
AGENT_SYSTEM_SERVICE_EVENT_TYPES = Service events:
Possible values include the following:
0x12070201 = Service starting
0x12070202 = Service started
0x12070203 = Service start failure
0x12070204 = Service stopped
0x12070205=Service stop failure
0x1207021A = Attempt to stop service
AGENT_SYSTEM_CONFIG_EVENT_TYPES = Configuration
events:
Possible values include the following:
0x12070206 = Config import complete
0x12070207 = Config import error
0x12070208 = Config export complete
0x12070209 = Config export error
Agent System Logs data table 43
Agent System Logs schema
Table 7-1 Agent System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
AGENT_SYSTEM_HI_EVENT_TYPES = Host Integrity
events:
Possible values include the following:
0x12070210 = Host Integrity disabled
0x12070211 = Host Integrity enabled
0x12070220 = NAP integration enabled
AGENT_SYSTEM_IMPORT_EVENT_TYPES = Import events:
Possible values include the following:
0x12070214 = Successfully imported advanced rule
0x12070215 = Failed to import advanced rule
0x12070216 = Successfully exported advanced rule
0x12070217 = Failed to export advanced rule
AGENT_SYSTEM_CLIENT_EVENT_TYPES = Client events:
Possible values include the following:
0x12070218 = Client Engine enabled
0x12070219 = Client Engine disabled
0x12071046 = Proactive Threat Scanning is not supported
on this platform
0x12071047 = Proactive Threat Scanning Load Error
AGENT_SYSTEM_SERVER_EVENT_TYPES = Server events:
Possible values include the following:
0x12070301 = Server connected
0x12070302 = No server response
0x12070303 = Server connection failed
0x12070304 = Server disconnected
0x120B0001 = Cannot reach server
0x120B0002 = Reconnected server
AGENT_SYSTEM_PROFILE_EVENT_TYPES = Policy events:
Possible values include the following:
0x12070306 = New policy received
44 Agent System Logs data table
Agent System Logs schema
Table 7-1 Agent System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
0x12070307 = New policy applied
0x12070308 = New policy failed
0x12070309 = Cannot download policy
0x120B0005 = Cannot download policy
0x1207030A = Have latest policy
0x120B0004 = Have latest policy
AGENT_SYSTEM_AV_EVENT_TYPES = Antivirus engine
events:
Possible values include the following:
0x12071006 = Scan Omission
0x1207100B = Virus Behavior Detected
0x1207100C = Configuration Changed
0x12071010 = Definition File Download
0x12071012 = Sent To Quarantine Server
0x12071013 = Delivered To Symantec
0x12071014 = Security Response Backup
0x12071015 = Scan Aborted
0x12071016 = Symantec AntiVirus Auto-Protect Load Error
0x12071017 = Symantec AntiVirus Auto-Protect Enabled
0x12071018 = Symantec AntiVirus Auto-Protect Disabled
0x1207101A = Scan Delayed
0x1207101B = Scan Restarted
0x12071027 = Symantec AntiVirus is using old virus
definitions
0x12071041 = Scan Suspended
0x12071042 = Scan Resumed
0x12071043 = Scan Duration Too Short
0x12071045 = Scan Enhancements Failed
AGENT_SYSTEM_LICENSE_EVENT_TYPES = License events:
Possible values include the following:
Agent System Logs data table 45
Agent System Logs schema
Table 7-1 Agent System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
0x1207101E = License Warning
0x1207101F = License Error
0x12071020 = License in Grace Period
0x12071023 = License Installed
0x12071025 = License Up-to-date
AGENT_SYSTEM_SECURITY_EVENT_TYPES = Security
events:
Possible values include the following:
0x1207102B = Computer not compliant with security policy
0x1207102C = Computer compliant with security policy
0x1207102D = Tamper Attempt
AGENT_SYSTEM_OTHER_EVENT_TYPES = Other events:
Possible values include the following:
0x1207020A = email post OK
0x1207020B = email post failure
0x1207020C = Update complete
0x1207020D = Update failure
0x1207020E = Manual location change
0x1207020F = Location changed
0x12070212 = Old Rasdll detected
0x12070213 = Autoupdate postponed
0x12070305 = Mode changed
0x1207030B = Cannot apply HI script
0x12070500 = System message from device control
0x12070600 = System message from anti-buffer overflow
driver
0x12071021 = Access Denied Warning
0x12071022 = Log Forwarding Error
0x12071044 = Client moved
EVENT_TIME The event-generated time (in GMT). bigint, not null
46 Agent System Logs data table
Agent System Logs schema
Table 7-1 Agent System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
SEVERITY The type of event. int, not null
Possible values are as follows:
INFO = 0
WARNING = 1
ERROR = 2
FATAL = 3
AGENT_ID The GUID of the agent. char(32), null
HARDWARE_KEY The hash of the computer hardware information. char(32), null
HOST_NAME The host name of client computer. nvarchar(256),
varchar(256), null
CATEGORY CATEGORY is not used now. int, null
EVENT_SOURCE The data source, such as NETPORT, NATSRV, etc. varchar(32), not null
EVENT_DESC A description of the event. Usually, the first line of the nvarchar(1024),
description is treated as “summary.” varchar(2048), null
EVENT_DATA Additional data in binary format. This field is optional. varbinary(2000), null
SEND_SNMP_TRAP SEND_SNMP_TRAP reflects the send SNMP trap action. tinyint, null
SEND_SNMP_TRAP is true if send is true.
Possible values are as follows:
Yes = 1
No = 0
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260),
varchar(260), null
Agent System Logs data table 47
Agent System Logs schema
Table 7-1 Agent System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
RESERVED_BINARY varbinary(2000), null
LOG_IDX* The log index unique ID. char(32), null
48 Agent System Logs data table
Agent System Logs schema
Chapter 8
Agent Traffic Logs data
table
This chapter includes the following topics:
■ Agent Traffic Logs schema
Agent Traffic Logs schema
Table 8-1 describes the database schema for the Agent Traffic logs.
This schema has two tables. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_AGENT_TRAFFIC_LOG_1_LOG_IDX or
I_AGENT_TRAFFIC_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.
Table 8-1 Agent Traffic Logs 1 and 2 schema
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
50 Agent Traffic Logs data table
Agent Traffic Logs schema
Table 8-1 Agent Traffic Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
GROUP_ID The GUID of the group to which the log belongs. char(32), not null
COMPUTER_ID The GUID of the client computer that is associated with the char(32), not null
agent traffic log.
TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
EVENT_ID An event ID from Symantec Endpoint Protection agent. int, not null
Possible values are as follows:
301 = TCP initiated
302 = UDP datagram
303 = Ping request
304 = TCP completed
305 = Traffic (other)
306 = ICMP packet
307 = Ethernet packet
308 = IP packet
EVENT_TIME The event-generated time (in GMT). bigint, not null
SEVERITY Severity as defined in the Security Rule. int, not null
Possible values are as follows:
Critical = 0 - 3
Major = 4 - 7
Minor = 8 - 11
Info = 12 - 15
AGENT_ID The GUID of the agent. char(32), null
HARDWARE_KEY The hash of the computer hardware information. char(32), null
Agent Traffic Logs data table 51
Agent Traffic Logs schema
Table 8-1 Agent Traffic Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
HOST_NAME The host name of the client computer. nvarchar(256),
varchar(256), null
LOCAL_HOST_IP The IP address of the local computer (IPv4). bigint, null
REMOTE_HOST_IP The IP address of the remote computer (IPv4). bigint, null
REMOTE_HOST_NAME The name of the remote computer. It may be empty if the nvarchar(64), varchar(64),
name resolution failed. null
NETWORK_PROTOCOL The protocol type: Enum (OTHERS = 1; TCP = 2; UDP = 3; tinyint, null
ICMP = 4).
LOCAL_PORT The TCP/UDP port in the local computer (host byte-order). int, null
It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.
REMOTE_PORT The TCP/UDP port in the remote computer (host byte-order). int, null
It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.
TRAFFIC_DIRECTION The direction of traffic. Enum (unknown = 0; inbound = 1; tinyint, null
outbound = 2)
BEGIN_TIME The start time of the security issue. bigint, null
END_TIME The end time of the security issue. End time is an optional bigint, null
field because we may fail to detect the exact end time of
traffic, like UDP. In those cases, the end time is equal to
begin time.
REPETITION The number of attacks. Sometimes, when a hacker launches int, null
a mass attack, it may be damped to one event by the log
system.
APP_NAME The full path of application involved. It may be empty if an nvarchar(256),
unknown application is involved or if no application is varchar(256) , null
involved. For example, the ping of death denial-of-service
attack doesn’t have AppName because it attacks the
operating system itself.
BLOCKED Specify if the traffic was blocked. tinyint, not null
Possible values are as follows:
Yes = 1
No = 0
52 Agent Traffic Logs data table
Agent Traffic Logs schema
Table 8-1 Agent Traffic Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
RULE_ID The ID of rule that the event triggered. It is always 0 if rule char(32), null
ID is not specified in security rule. The field is helpful to
security rule troubleshooting. If multiple rules matched, it
logs the rule that has final decision on PacketProc
(pass/block/drop).
RULE_NAME The name of rule that the event triggered. It is always an nvarchar(256),
empty string if a rule name is not specified in the security varchar(256), null
rule. It is also used for troubleshooting. In theory, an IT
admin can know the rule by its ID. However, a name gives
the user a direct view of a rule that can be used.
ALERT ALERT reflects the alert attribute in the profile action. If tinyint, null
the Network Threat Protection policy indicates that the
event should be considered for server-side notification
generation, the ALERT field is set to 1.
Possible values are as follows:
Yes = 1
No = 0
SEND_SNMP_TRAP It reflects the send SNMP trap action. SEND_SNMP_TRAP tinyint, null
is true if send is true.
Possible values are as follows:
Yes = 1
No = 0
LOCAL_HOST_MAC The MAC address of local computer. varchar(18), null
REMOTE_HOST_MAC The MAC address of remote computer. varchar(18), null
LOCATION_NAME The location that was used when event occurs. nvarchar(256),
varchar(256), null
USER_NAME The logon user name. nvarchar(256),
varchar(256), null
DOMAIN_NAME The logon domain name. nvarchar(256),
varchar(256), null
RESERVED_INT1 int, null
RESERVED_INT2 int, null
Agent Traffic Logs data table 53
Agent Traffic Logs schema
Table 8-1 Agent Traffic Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260),
varchar(260), null
RESERVED_BINARY varbinary(2000), null
LOG_IDX* The log index unique ID. char(32), null
54 Agent Traffic Logs data table
Agent Traffic Logs schema
Chapter 9
Alert Filter data table
This chapter includes the following topics:
■ Alert Filter schema
Alert Filter schema
Table 9-1 describes the database schema for alert filter information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ALERTFILTER.
Table 9-1 Alert Filter schema
Database Field Name Comment Data Type
ALERTFILTER_IDX* Primary Key. char(32), not null
USER_ID The user ID. char(32), not null
FILTERNAME The user-specified name of the filter. nvarchar(255),
varchar(255), not null
STARTDATEFROM The start date. datetime, not null
STARTDATETO The end date. datetime, not null
56 Alert Filter data table
Alert Filter schema
Table 9-1 Alert Filter schema (continued)
Database Field Name Comment Data Type
RELATIVEDATETYPE Possible values are as follows: int, not null
0 = past week
1 = past month
2 = past three months
3 = past year
4 = past 24 hours
5 = current month
FILTERACKNOWLEDGED Possible values are as follows: nvarchar(255),
varchar(255), not null
1 = Acknowledged
0 = Unacknowledged
FILTERSUBJECT Possible values are as follows: nvarchar(255),
varchar(255), not null
AF = Authentication failure
CL = Client list changed
CS = Client security alert
ED = Enforcer Down
WL = Forced or commercial application detected
LA = New learned application
NV = New risk detected
NS = New software package
VO = Virus outbreak
DF = Server health
1V = Single risk event
SE = System event
UM = Unmanaged computer
ID = Virus definitions out-of-date
FILTERCREATEDBY The GUID of the administrator who created this alert filter. nvarchar(255),
varchar(255), not null
LASTCOLUMN Not used. varchar(255), not null
Alert Filter data table 57
Alert Filter schema
Table 9-1 Alert Filter schema (continued)
Database Field Name Comment Data Type
SERVERGROUP Not used. nvarchar(255),
varchar(255), not null
CLIENTGROUP Not used. nvarchar(255),
varchar(255), not null
PARENTSERVER Not used. nvarchar(255),
varchar(255), not null
COMPUTER Not used. nvarchar(255),
varchar(255), not null
THREATNAME Not used. nvarchar(255),
varchar(255), not null
THREATCATEGORY Not used. varchar(255), not null
SOURCE Not used. varchar(255), not null
ACTUALACTION Not used. varchar(255), not null
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
REPORTINPUTS Special parameters if a report needs them. nvarchar(64), varchar(64),
not null
NOTIFICATIONNAME The name of selected notification condition. nvarchar(255),
varchar(255), not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = not deleted
1 = deleted
58 Alert Filter data table
Alert Filter schema
Chapter 10
Agent Status data table
This chapter includes the following topics:
■ Agent Status schema
Agent Status schema
Table 10-1 describes the database schema for agent status information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_AGENTSTATUS.
Table 10-1 Agent Status schema
Database Field Name Comment Data Type
IDX* Primary Key. char(32), not null
60 Agent Status data table
Agent Status schema
Table 10-1 Agent Status schema (continued)
Database Field Name Comment Data Type
AGENTTYPE Possible values for AGENTTYPE include the following: varchar(255), not null
SAV 10.x
LogSender
ClientInventory
SAV 11.x
AgentSweepingTask (Database maintenance)
TopThreatsTask (Gathers top and latest threats information)
VirusCatTask (Gathers virus properties)
ThreatCatTask (Gathers risk properties)
AGENTNAME Name that is associated with this agent. varchar(255), not null
for LogSender agents: Server Group name
for LogSenderSAVSMTP agents: mail gateway host name
for ClientInventory agents: name of Parent Server
else: blank
LASTRUNGMT Last time this agent ran stored in GMT. varchar(50), not null
REMOTE_TZ_OFFSET The time zone offset. int, not null
REPORTER_TZ_OFFSET The time zone offset. int, not null
MAIL Flag whether email has already been sent. int, not null
Possible values are as follows:
1 = Yes
0 = No
VERSION_BUILD The version/build (major.minor.build) of the agent. varchar(20), not null
MACHINE_NAME The computer name of the client computer. nvarchar(128),
varchar(128), not null
SERVERGROUP_IDX Pointer to IDENTITY_MAP table. char(32), not null
LASTRUN_DATA Extra data that is associated with the agent run, if any. nvarchar(255),
varchar(255), null
Chapter 11
Alert Message data table
This chapter includes the following topics:
■ Alert Message schema
Alert Message schema
Table 11-1 describes the database schema for alert message information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ALERTMSG.
Table 11-1 Alert Message schema
Database Field Name Comment Data Type
ALERT_IDX* Primary Key (one of 1 through 9). int, not null
62 Alert Message data table
Alert Message schema
Table 11-1 Alert Message schema (continued)
Database Field Name Comment Data Type
ALERT ALERT is a hard-coded English string that is used as a lookup varchar(128), not null
It corresponds to an event ID from the Symantec Endpoint
Protection agent.
Possible values are as follows:
1 = Virus found
2 = Security risk found
3 is not used
4 is not used
5 = Commercial application detected
6 = Forced proactive threat detected
7 = Proactive detection now permitted
8 = Potential risk found
9 = Risk sample was submitted to Symantec
Chapter 12
Alerts data table
This chapter includes the following topics:
■ Alerts schema
Alerts schema
Table 12-1 describes the database schema for alerts information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ALERTS.
Table 12-1 Alerts schema
Database Field Name Comment Data Type
IDX* Primary Key. char(32), not null
ALERT_IDX Pointer to table ALERTMSG. int, not null
COMPUTER_IDX Foreign key to SEM_COMPUTER.COMPUTER_ID. char(32), not null
64 Alerts data table
Alerts schema
Table 12-1 Alerts schema (continued)
Database Field Name Comment Data Type
SOURCE A hard-coded English string that is used as a lookup key varchar(50), not null
for the following scan types:
"Scheduled Scan"
"Manual Scan"
"Real Time Scan"
"Integrity Shield"
"Definition downloader"
"System"
"Startup Scan"
"DefWatch"
"Manual Quarantine"
"Reboot Processing"
"Heuristic Scan"
VIRUSNAME_IDX Pointer to table VIRUS. char(32), not null
NOOFVIRUSES The number of events for the aggregated event record. int, not null
This number can be due to client-side aggregation,
server-side compression, or both.
FILEPATH The file path of attacked file. nvarchar(255), varchar(255),
not null
DESCRIPTION A description of the event. nvarchar(255), varchar(255),
not null
ACTUALACTION_IDX Pointer to table ACTUALACTION, this is the action int, not null
taken on the risk.
REQUESTEDACTION_IDX Pointer to table ACTUALACTION; this is the action int, not null
requested by the policy.
SECONDARYACTION_IDX Pointer to table ACTUALACTION; this is the secondary int, not null
action requested by the policy.
ALERTDATETIME The time of event occurrences. datetime, not null
ALERTINSERTTIME The time at which the event was inserted in to the datetime, not null
database.
Alerts data table 65
Alerts schema
Table 12-1 Alerts schema (continued)
Database Field Name Comment Data Type
SERVERGROUP_IDX Pointer to table IDENTITY_MAP; this is the Symantec char(32), not null
Endpoint Protection Manager domain GUID.
USER_NAME The name of the user that was logged onto the computer nvarchar(64), varchar(64),
when the event took place. not null
PARENTSERVER_IDX Pointer to table IDENTITY_MAP; this is the Symantec char(32), not null
Endpoint Protection Manager server GUID.
CLIENTGROUP_IDX Pointer to table IDENTITY_MAP; this is the Symantec char(32), not null
Endpoint Protection Manager group GUID.
SOURCE_COMPUTER_NAME The source of the threat. It is logged when threat tracer nvarchar(64), varchar(64),
is enabled in the antivirus and antispyware policy. not null
SOURCE_COMPUTER_IP The source of the threat. It is logged when threat tracer bigint, not null
is enabled in the antivirus and antispyware policy.
MOTHER_IDX Pointer to the related compressed event in the ALERTS char(32), not null
table. This is the compressed event created by database
maintenance. A value here means that this event has
been aggregated server-side and is a child event.
LAST_LOG_SESSION_GUID An ID that is used by the client to keep track of related char(32), not null
threat events.
ALERTENDDATETIME The time at which the event ended. This is the end of datetime, not null
the aggregated event time.
HPP_APP_IDX Pointer to HPP_APPLICATION table. varchar(32), not null
SITE_IDX Pointer to table IDENTITY_MAP; this is the Symantec char(32), null
Endpoint Protection Manager site GUID.
VBIN_ID The client-side ID of the quarantined threat, if bigint, not null
quarantined.
SCAN_ID Pointer to the scan table event that picked up this event. bigint, not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
66 Alerts data table
Alerts schema
Table 12-1 Alerts schema (continued)
Database Field Name Comment Data Type
DELETED Deleted row: tinyint, not null
0 = not deleted
1 = deleted
Chapter 13
Anomaly Detection data
table
This chapter includes the following topics:
■ Anomaly Detection schema
Anomaly Detection schema
Table 13-1 describes the database schema for anomaly detection information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYDETECTION.
Table 13-1 Anomaly Detection schema
Database Field Name Comment Data Type
ANOMALY_DETECTION_IDX* Primary Key. char(32), not null
ANOMALY_DETECTION_OPERATION_ID Pointer to table int, not null
'Anomalydetectionoperation'.
ANOMALY_DETECTION_TYPE_ID Pointer to table 'Anomalydetectiontype'. int, not null
ACTION_OPERAND The file or the registry key on which this nvarchar(512),
action took place. varchar(512), not null
USN A USN-based serial number; this ID is not bigint, not null
unique.
68 Anomaly Detection data table
Anomaly Detection schema
Table 13-1 Anomaly Detection schema (continued)
Database Field Name Comment Data Type
TIME_STAMP The time when this database record was bigint, not null
entered or modified in the database, in
milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = not deleted
1 = deleted
Chapter 14
Anomaly Detection
Operation data table
This chapter includes the following topics:
■ Anomaly Detection Operation schema
Anomaly Detection Operation schema
Table 14-1 describes the database schema for anomaly detection operation
information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYDETECTIONOPERATION.
Table 14-1 Anomaly Detection Operation schema
Database Field Name Comment Data Type
DETECTION_OPERATION_ID* 0-8 int, not null
70 Anomaly Detection Operation data table
Anomaly Detection Operation schema
Table 14-1 Anomaly Detection Operation schema (continued)
Database Field Name Comment Data Type
DETECTION_OPERATION_DESC Detection_Operation_ID, varchar(255), not null
Detection_Operation_Desc. A
hard-coded English string that is
used for a lookup
Possible values are as follows:
0 = Unknown
1 = Scan
2 = Present
3 = Not Present
4 = Equal
5 = Not Equal
6 = Equal (Case-insensitive)
7 = Not Equal (Case-insensitive)
8 = Scan Memory
Chapter 15
Anomaly Detections data
table
This chapter includes the following topics:
■ Anomaly Detections schema
Anomaly Detections schema
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as the Primary
Key, PK_ANOMALYDETECTIONS.
Table 15-1 Anomaly Detections schema
Database Field Name Comment Data Type
ALERT_EVENT_IDX Foreign key to ALERTS.IDX. char(32), not null
ANOMALY_DETECTION_IDX Pointer to table 'anomalydetection'. char(32), not null
STATUS The scan detection status. Currently always 1 to mean int, not null
"successful detection performed". Other values are
reserved for future use.
LOG_SESSION_GUID The LOG_SESSION_GUID is an ID that the client uses char(32), not null
to keep track of related threat events.
USN A USN-based serial number; this ID is not unique. bigint, not null
72 Anomaly Detections data table
Anomaly Detections schema
Table 15-1 Anomaly Detections schema (continued)
Database Field Name Comment Data Type
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = not deleted
1 = deleted
ID* Primary Key (added 11.0.1). char(32), not null
Chapter 16
Anomaly Detection Type
data table
This chapter includes the following topics:
■ Anomaly Detection Type schema
Anomaly Detection Type schema
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYDETECTIONTYPE .
Table 16-1 Anomaly Detection Type schema
Database Field Name Comment Data Type
DETECTION_TYPE_ID* Primary Key. int, not null
74 Anomaly Detection Type data table
Anomaly Detection Type schema
Table 16-1 Anomaly Detection Type schema (continued)
Database Field Name Comment Data Type
DETECTION_TYPE_DESC Detection_Type_ID, varchar(255), not null
Detection_Type_Desc. A hard-coded
English string that is used for a
lookup
Possible values are as follows:
1000 = Registry
1001 = File
1002 = Process
1003 = Batch File
1004 = INI File
1005 = Service
1006 = Infected File
1007 = COM Object
1008 = Hosts File Entry
1009 = Directory
1010 = Layered Service Provider
Chapter 17
Anomaly Remediation data
table
This chapter includes the following topics:
■ Anomaly Remediation schema
Anomaly Remediation schema
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYREMEDIATION.
Table 17-1 Anomaly Remediation schema
Database Field Name Comment Data Type
ANOMALY_REMEDIATION_IDX* Primary Key. char(32), not null
ANOMALY_REMEDIATION_OPERATION_ID Pointer to table int, not null
'anomalyremediationoperation'.
ANOMALY_REMEDIATION_TYPE_ID Pointer to table int, not null
'anomalyremediationtype'.
ACTION_OPERAND The file or the registry key on nvarchar(512), varchar(512),
which this action took place. not null
USN A USN-based serial number; bigint, not null
this ID is not unique.
76 Anomaly Remediation data table
Anomaly Remediation schema
Table 17-1 Anomaly Remediation schema (continued)
Database Field Name Comment Data Type
TIME_STAMP The time when this database bigint, not null
record was entered or modified
in the database, in milliseconds
since 1970.
DELETED Deleted row: tinyint, not null
0 = not deleted
1 = deleted
Chapter 18
Anomaly Remediation
Operation data table
This chapter includes the following topics:
■ Anomaly Remediation Operation schema
Anomaly Remediation Operation schema
Table 18-1 describes the database schema for anomaly remediation operation
information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYREMEDIATIONOPERATION.
Table 18-1 Anomaly Remediation Operation schema
Database Field Name Comment Data Type
REMEDIATION_OPERATION_ID* Primary Key. int, not null
78 Anomaly Remediation Operation data table
Anomaly Remediation Operation schema
Table 18-1 Anomaly Remediation Operation schema (continued)
Database Field Name Comment Data Type
REMEDIATION_OPERATION_DESC varchar(255), not
null
Anomaly Remediation Operation data table 79
Anomaly Remediation Operation schema
Table 18-1 Anomaly Remediation Operation schema (continued)
Database Field Name Comment Data Type
Remediation_Operation_ID,
Remediation_Operation_Desc. A hard-coded
English string that is used for a lookup.
Possible values are as follows:
0 = Unknown
1 = Delete
2 = Delete Line
3 = Move
4 = Create Empty File
5 = Set
6 = Terminate
7 = Suspend
8 = Stop
9 = Remove
10 = Handle Threat
11 = Set IP Address
12 = Set Domain Name
13 = Deny Access
999 = Invalid
1001 = Move
1002 = Rename
1003 = Delete
1004 = Leave Alone
1005 = Clean
1006 = Remove Macros
1007 = Save As
1008 = Move Back
1010 = Rename Back
1011 = Undo
1012 = Bad
80 Anomaly Remediation Operation data table
Anomaly Remediation Operation schema
Table 18-1 Anomaly Remediation Operation schema (continued)
Database Field Name Comment Data Type
1013 = Backup
1014 = Pending
1015 = Partial
1016 = Terminate
1017 = Exclude
1018 = Reboot Processing
1019 = Clean By Deletion
1020 = Access Denied
Chapter 19
Anomaly Remediations data
table
This chapter includes the following topics:
■ Anomaly Remediations schema
Anomaly Remediations schema
Table 19-1 describes the database schema for anomaly remediations information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYREMEDIATIONS.
Table 19-1 Anomaly Remediations schema
Database Field Name Comment Data Type
ALERT_EVENT_IDX Foreign key to ALERTS.IDX. char(32), not null
ANOMALY_REMEDIATION_IDX Pointer to table char(32), not null
'anomalyremediation'.
STATUS 1 = successful remediation, 0 = failed int, not null
remediation, no default.
LOG_SESSION_GUID The ID that the client uses to keep char(32), not null
track of related threat events.
82 Anomaly Remediations data table
Anomaly Remediations schema
Table 19-1 Anomaly Remediations schema (continued)
Database Field Name Comment Data Type
USN A USN-based serial number; this ID bigint, not null
is not unique.
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = Not deleted
1 = deleted
ID* Primary Key (added 11.0.1). char(32), not null
Chapter 20
Anomaly Remediation Type
data table
This chapter includes the following topics:
■ Anomaly Remediation Type schema
Anomaly Remediation Type schema
Table 20-1 describes the database schema for anomaly remediation type
information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYREMEDIATIONTYPE.
Table 20-1 Anomaly Remediation Type schema
Database Field Name Comment Data Type
REMEDIATION_TYPE_ID* Primary Key. int, not null
84 Anomaly Remediation Type data table
Anomaly Remediation Type schema
Table 20-1 Anomaly Remediation Type schema (continued)
Database Field Name Comment Data Type
REMEDIATION_TYPE_DESC The number is the varchar(255), not null
REMEDIATION_TYPE_ID and the
string on the right of the equal sign
is the REMEDIATION_TYPE_DESC
that corresponds to the numeric ID.
The English string is used as a lookup
key.
Possible values are as follows:
2000 = Registry
2001 = File
2002 = Process
2003 = Batch File
2004 = INI File
2005 = Service
2006 = Infected File
2007 = COM Object
2008 = Hosts File Entry
2009 = Directory
2010 = Layered Service Provider
2011 = Internet Browser Cache
Chapter 21
Audit Report data table
This chapter includes the following topics:
■ Audit Report schema
Audit Report schema
Table 21-1 describes the database schema for audit report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_AUDITREPORT.
Table 21-1 Audit Report schema
Database Field Name Comment Data Type
AUDITFILTER_IDX* Primary Key. char(32), not null
USER_ID The GUID of the administrator who char(32), not null
created this filter.
FILTERNAME The name of the filter. nvarchar(255), varchar(255), not null
STARTDATEFROM The start time for the filter. datetime, not null
STARTDATETO The end time for the filter. datetime, not null
86 Audit Report data table
Audit Report schema
Table 21-1 Audit Report schema (continued)
Database Field Name Comment Data Type
RELATIVEDATETYPE Possible values are as follows: int, not null
0 = past week
1 = past month
2 = past three months
3 = past year
4 = past 24 hours
5 = current month
EVENTTYPE Possible values are as follows: int, null
0 = Policy added
1 = Policy deleted
2 = Policy edited
3 = Add shared policy upon system
install
4 = Add shared policy upon system
upgrade
5 = Add shared policy upon domain
creation
SERVERGROUPLIST Comma-separated domain names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
PARENTSERVERLIST Comma-separated server names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
USERLIST Comma-separated user names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
POLICYNAMELIST Comma-separated policy names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
SITELIST Comma-separated site names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
Audit Report data table 87
Audit Report schema
Table 21-1 Audit Report schema (continued)
Database Field Name Comment Data Type
SORTORDER The column/field by which to sort varchar(32), not null
data.
SORTDIR Possible values are as follows: varchar(5), not null
DESC = descending sort
ASC = ascending sort
LIMITROWS The number of rows to use for int, not null
pagination.
USERELATIVE Use relative dates ('on') or absolute char(2), not null
dates.
REPORT_IDX Not used. int, not null
REPORTINPUTS Special parameters if a report needs nvarchar(64), varchar(64), not null
them.
USN A USN-based serial number. This ID bigint, not null
is not unique.
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
DELETED Deleted flag: tinyint, not null
0 = Not deleted
1 = Deleted
88 Audit Report data table
Audit Report schema
Chapter 22
Basic Metadata data table
This chapter includes the following topics:
■ Basic Metadata schema
Basic Metadata schema
Table 22-1 describes the database schema for basic metadata information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_BASIC_METADATA.
Table 22-1 Basic Metadata schema
Database Field Name Comment Data Type
CHECKSUM The checksum of the XML content. char(32), not null
CONTENT The XML content of the schema image, not null
object.
DELETED Deleted flag: tinyint, not null
0 = Deleted
1 = Not deleted
ID* The GUID of the schema object. char(32), not null
OWNER The GUID of the owner. It only char(32), null
applies to a private object.
90 Basic Metadata data table
Basic Metadata schema
Table 22-1 Basic Metadata schema (continued)
Database Field Name Comment Data Type
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflict.
TYPE The type name of the schema object. varchar(256), not null
USN The update serial number; used by bigint, not null
replication.
DOMAIN_ID The GUID of the domain to which the char(32), null
object belongs.
SemRootConfig and SemSite do not
have DOMAIN_ID.
REF_ID The object reference ID. varchar(32), null
NAME The object name. nvarchar(2000), varchar(2000), null
DESCRIPTION The object description. nvarchar(256), varchar(256), null
LAST_MODIFY_TIME The last modify time. bigint, null
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260), varchar(260), null
RESERVED_BINARY varbinary(2000), null
Chapter 23
Behavior Report data table
This chapter includes the following topics:
■ Behavior Report schema
Behavior Report schema
Table 23-1 describes the database schema for behavior report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_BEHAVIORREPORT.
Table 23-1 Behavior report schema
Database Field Name Comment Data Type
BEHAVIORFILTER_IDX* Primary Key. char(32), not null
USER_ID The GUID of user who created this char(32), not null
filter.
FILTERNAME The name of the filter. nvarchar(255), varchar(255), not null
STARTDATEFROM The filter start date. datetime, not null
STARTDATETO The filter end date. datetime, not null
92 Behavior Report data table
Behavior Report schema
Table 23-1 Behavior report schema (continued)
Database Field Name Comment Data Type
RELATIVEDATETYPE Possible values are as follows: int, not null
0 = past week
1 = past month
2 = past three months
3 = past year
4 = past 24 hours
5 = current month
BEHAVIORTYPE Possible values are as follows: tinyint, null
1 = Application type
2 = Device Control type
SEVERITY Possible values are as follows: int, null
1 = Critical
5 = Major
9 = Minor
13 = Information
EVENTTYPE For Application Control. int, null
Possible values are as follows:
501 = Application Control Driver
502 = Application Control Rules
999 = Tamper Protection
ACTION Possible values are as follows: tinyint, null
0 = Allow
1 = Block
2 = Ask
3 = Continue
4 = Terminate
SERVERGROUPLIST Comma-separated domain names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
Behavior Report data table 93
Behavior Report schema
Table 23-1 Behavior report schema (continued)
Database Field Name Comment Data Type
CLIENTGROUPLIST Comma-separated group names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
PARENTSERVERLIST Comma-separated server names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
COMPUTERLIST Comma-separated computer names nvarchar(512), varchar(512), not null
by which to filter. These names can
contain wildcard characters.
SITELIST Comma-separated site names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
CALLERPROCESSLIST Comma-separated process names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
IPADDRESSLIST Comma-separated IP by which to nvarchar(255), varchar(255), not null
filter. These names can contain
wildcard characters.
USERLIST Comma-separated user names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
TEST_MODE Possible values are as follows: tinyint, null
1 = Yes
0 = No
SORTORDER The table column to sort by. varchar(32), not null
SORTDIR Possible values are as follows: varchar(5), not null
DESC = descending order
ASC = Ascending order
LIMITROWS The number of rows to show for int, not null
pagination.
USERELATIVE Use relative dates ('on') or absolute char(2), not null
dates.
94 Behavior Report data table
Behavior Report schema
Table 23-1 Behavior report schema (continued)
Database Field Name Comment Data Type
REPORT_IDX Not used. int, not null
REPORTINPUTS Special parameters if a report needs nvarchar(64), varchar(64), not null
them.
USN A USN-based serial number; this ID bigint, not null
is not unique.
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
DELETED Deleted flag; tinyint, not null
0 = Not deleted
1 = Deleted
Chapter 24
Binary File data table
This chapter includes the following topics:
■ Binary File schema
Binary File schema
Table 24-1 describes the database schema for binary file information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_BINARY_FILE.
Table 24-1 Binary File schema
Database Field Name Comment Data Type
CHECKSUM The checksum of XML content. char(32), null
CONTENT The XML content of the schema image, null
object.
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
1 = Deleted
0 = Not Deleted
ID* The GUID of the schema object. char(32), not null
96 Binary File data table
Binary File schema
Table 24-1 Binary File schema (continued)
Database Field Name Comment Data Type
OWNER The GUID of the owner. It only char(32), null
applies to private object
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflict.
TYPE The type name of the schema object. varchar(256), null
USN The update serial number; used by bigint, not null
replication.
DOMAIN_ID The GUID of the domain to which the char(32), null
binary file belongs.
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260), varchar(260), null
RESERVED_BINARY varbinary(2000), null
Chapter 25
Command data table
This chapter includes the following topics:
■ Command schema
Command schema
Table 25-1 describes the database schema for command information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_COMMAND.
Table 25-1 Command schema
Database Field Name Comment Data Type
HARDWARE_KEY* The hash of the computer hardware information. char(32), not null
COMMAND_ID* The GUID of the command object. This GUID corresponded char(32), not null
to the ID in the Basic Metadata table.
DOMAIN_ID The domain ID currently being administered when the char(32), not null
command is created.
USN The update serial number; used by replication. bigint, not null
BEGIN_TIME The time that the command was launched at the client (in bigint, not null
GMT).
LAST_UPDATE_TIME The time of the last status that the client reported (in GMT). bigint, not null
98 Command data table
Command schema
Table 25-1 Command schema (continued)
Database Field Name Comment Data Type
STATE_ID Command status: a numeric value that corresponds to one int, not null
of the following values:
0 = INITIAL
1 = RECEIVED
2 = IN_PROGRESS
3 = COMPLETED
4 = REJECTED
5 = CANCELLED
6 = ERROR
When first created, the command’s status = INITIAL. It
indicates that the endpoint has not received it yet.
SUB_STATE_ID Command-specific status. int, null
Possible values are as follows:
0 = Success
1 = Client did not execute the command
2 = Client did not report any status
3 = Command was a duplicate and not executed
4 = Spooled command cannot restart
100 = Success
101 = Security risk found
102 = Scan was suspended
103 = Scan was aborted
105 = Scan did not return status
110 = Auto-Protect cannot be turned on
120 = LiveUpdate download is in progress
121 = LiveUpdate download failed
131 = Quarantine delete failed
132 = Quarantine delete partial success
SUB_STATE_DESC Command-specific extra information, such as the number nvarchar(260),
of files that were scanned or an error message. varchar(260), null
Command data table 99
Command schema
Table 25-1 Command schema (continued)
Database Field Name Comment Data Type
ESTIMATED_DURATION The agent estimation of command duration in minutes. 0 = int, not null
no estimate or negligible time.
PERCENT_COMPLETE Progress (0-100%) of the command that was based on tinyint, not null
estimated duration.
TIME_STAMP The time when the command was added into the database, bigint, not null
in milliseconds since 1970.
DELETED The deleted flag of the schema object: tinyint, not null
1 = Deleted
0 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 varchar(260), null
RESERVED_BINARY varbinary(1000),
null
100 Command data table
Command schema
Chapter 26
Command Report data table
This chapter includes the following topics:
■ Command Report schema
Command Report schema
Table 26-1 describes the database schema for command report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_COMMANDREPORT.
Table 26-1 Command Report schema
Database Field Name Comment Data Type
COMMANDFILTER_IDX* Primary Key. char(32), not null
USER_ID The GUID of user who created this filter. char(32), not null
FILTERNAME The name of the filter. nvarchar(255),
varchar(255), not null
STARTDATEFROM The start time. datetime, not null
STARTDATETO The end time. datetime, not null
102 Command Report data table
Command Report schema
Table 26-1 Command Report schema (continued)
Database Field Name Comment Data Type
RELATIVEDATETYPE Possible values are as follows: int, not null
0 = past week
1 = past month
2 = past three months
3 = past year
4 = past 24 hours
5 = current month
STATE_ID Command status. int, null
Possible values are as follows:
0 = Not received
1 = Received
2 = In progress
3 = Completed
4 = Rejected
5 = Canceled
6 = Error
Command Report data table 103
Command Report schema
Table 26-1 Command Report schema (continued)
Database Field Name Comment Data Type
SUB_STATE_ID Status Details. int, null
Possible values are as follows:
0 = Success
1 = Client did not execute the command
2 = Client did not report any status
3 = Command was a duplicate and not executed
4 = Spooled command cannot restart
101 = Security risk found
102 = Scan was suspended
103 = Scan was aborted
105 = Scan did not return status
110 = Auto-Protect cannot be turned on
120 = LiveUpdate download is in progress
121 = LiveUpdate download failed
131 = Quarantine delete failed
132 = Quarantine delete partial success
PERCENT_COMPLETE The command progress. tinyint, null
COMPUTERLIST A comma-separated list of computer names to filter. These nvarchar(512),
names can contain wildcard characters. varchar(512), not null
SORTORDER The column name in the table to sort by. varchar(32), not null
SORTDIR Possible values are as follows: varchar(5), not null
DESC = Descending order
ASC = Ascending order
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
REPORT_IDX Not used. int, not null
REPORTINPUTS Special parameters if a report needs them. nvarchar(64),
varchar(64), not null
USN A USN-based serial number; this ID is not unique. bigint, not null
104 Command Report data table
Command Report schema
Table 26-1 Command Report schema (continued)
Database Field Name Comment Data Type
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
DELETED Deleted rows: tinyint, not null
0 = not deleted
1 = deleted
Chapter 27
Compliance Report data
table
This chapter includes the following topics:
■ Compliance Report schema
Compliance Report schema
Table 27-1 describes the database schema for compliance report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_COMPLIANCEREPORT.
Table 27-1 Compliance Report schema
Database Field Name Comment Data Type
COMPLIANCEFILTER_IDX* Primary Key. char(32), not null
USER_ID The GUID of user who created this filter. char(32), not null
FILTERNAME The filter name. nvarchar(255),
varchar(255), not null
STARTDATEFROM The start date. datetime, not null
STARTDATETO The end date. datetime, not null
106 Compliance Report data table
Compliance Report schema
Table 27-1 Compliance Report schema (continued)
Database Field Name Comment Data Type
RELATIVEDATETYPE Possible values are as follows: int, not null
0 = past week
1 = past month
2 = past three months
3 = past year
4 = past 24 hours
5 = current month
COMPLIANCE_TYPE Possible values are as follows: tinyint, null
1 = Enforcer Server
2 = Enforcer Client
3 = Enforcer Traffic
4 = Host Compliance
5 = Attack (Firewall logs)
6 = Device Control
SEVERITY Possible values are as follows: int, null
1 = Critical (which filters on SEVERITY >= 0 AND
SEVERITY <= 3)
5 = Major (which filters on SEVERITY >= 4 AND
SEVERITY <= 7)
9 = Minor (which filters on SEVERITY >= 8 AND
SEVERITY <= 11)
13 = Info (which filters on SEVERITY >= 12 AND
SEVERITY <= 15)
Compliance Report data table 107
Compliance Report schema
Table 27-1 Compliance Report schema (continued)
Database Field Name Comment Data Type
EVENT_ID int, null
108 Compliance Report data table
Compliance Report schema
Table 27-1 Compliance Report schema (continued)
Database Field Name Comment Data Type
Events for Enforcer Server.
Possible values are as follows:
1 = Enforcer registered
2 = Enforcer failed to register
5 = Enforcer downloaded policy
7 = Enforcer downloaded sylink.xml
9 = Server received Enforcer log
12 = Server received Enforcer information
Events for Enforcer Traffic.
Possible values are as follows:
17 = Incoming traffic blocked
18 = Outgoing traffic blocked
33 = Incoming traffic allowed
34 = Outgoing traffic allowed
Events for Host compliance.
Possible values are as follows:
209 = Host Integrity failed
210 = Host Integrity passed
221 = Host Integrity check failed but reported as PASS
237 = Host Integrity custom log entry
Events for Attack (firewall).
Possible values are as follows:
207 = Active Response
211 = Active Response disengaged
219 = Active Response canceled
217 = Executable file change accepted
218 = Executable file change denied
220 = Application Hijack
201 = N/A (invalid traffic by rule)
202 = Port Scan
Compliance Report data table 109
Compliance Report schema
Table 27-1 Compliance Report schema (continued)
Database Field Name Comment Data Type
203 = Denial-of-service attack
204 = Trojan horse
206 = Intrusion Prevention
208 = MAC Spoofing
Events for Device control:
238 = Device control disabled device
BLOCKED Possible values are as follows: tinyint, null
0 = Blocked
1 = Not Blocked
NETWORK_PROTOCOL Possible values are as follows: tinyint, null
1 = Other
2 = TCP
3 = UDP
4 = ICMP
TRAFFIC_DIRECTION Possible values are as follows: tinyint, null
1 = Inbound
2 = Outbound
0 = Unknown
SERVERGROUPLIST Comma-separated domain names by which to filter. nvarchar(255),
These names can contain wildcard characters. varchar(255), not null
CLIENTGROUPLIST Comma-separated group names by which to filter. These nvarchar(255),
names can contain wildcard characters. varchar(255), not null
PARENTSERVERLIST Comma-separated server names by which to filter. These nvarchar(255),
names can contain wildcard characters. varchar(255), not null
COMPUTERLIST Comma separate computer names by which to filter. nvarchar(512),
These names can contain wildcard characters. varchar(512), not null
IPADDRESSLIST Comma-separated IP list by which to filter. These names nvarchar(255),
can contain wildcard characters. varchar(255), not null
USERLIST Comma-separated user names by which to filter. These nvarchar(255),
names can contain wildcard characters. varchar(255), not null
110 Compliance Report data table
Compliance Report schema
Table 27-1 Compliance Report schema (continued)
Database Field Name Comment Data Type
SITELIST Comma-separated site names by which to filter. These nvarchar(255),
names can contain wildcard characters. varchar(255), not null
ENFORCERLIST Comma-separated Enforcer names by which to filter. nvarchar(255),
These names can contain wildcard characters. varchar(255), not null
REMOTEHOSTLIST Comma-separated remote computer names by which to nvarchar(255),
filter. These names can contain wildcard characters. varchar(255), not null
REMOTEIPLIST Comma-separated remote IP list by which to filter. These nvarchar(255),
names can contain wildcard characters. varchar(255), not null
LOCAL_PORT The port number. int, null
HACK_TYPE Possible values are as follows: int, null
0 = Process is not running
1 = Signature is out-of-date
2 = Recovery was tried
ACTION For Enforcer Client. varchar(32), not null
Possible values are as follows:
Authenticated
Disconnected
Passed
Rejected
Failed
ENFORCER_TYPE For Enforcer Client. tinyint, null
Possible values are as follows:
0 = Gateway Enforcer
1 = LAN Enforcer
2 = DHCP Enforcer
3 = Integrated Enforcer
4 = NAP Enforcer
5 = Peer-to-Peer Enforcer
Compliance Report data table 111
Compliance Report schema
Table 27-1 Compliance Report schema (continued)
Database Field Name Comment Data Type
OS_TYPE Possible values are as follows: int, null
600 = Windows Vista and Windows Server 2008
502 = Windows 2003 and Windows XP 64 bit
501 = Windows XP
500 = Windows 2000
400 = Windows NT
000 = Other
SORTORDER The log column to sort. varchar(32), not null
SORTDIR Possible values are as follows: varchar(5), not null
DESC = Descending
ASC = Ascending
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
REPORT_IDX Not used. int, not null
REPORTINPUTS Special parameters if a report needs them. nvarchar(64),
varchar(64), not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
DELETED Deleted entry; tinyint, not null
0 = Not deleted
1 = Deleted
FULL_CHARTS An administrator-specified list of charts to include in varchar(255), not null
the Network Threat Protection Full Report.
112 Compliance Report data table
Compliance Report schema
Chapter 28
Computer Application data
table
This chapter includes the following topics:
■ Computer Application schema
Computer Application schema
Table 28-1 describes the database schema for computer application information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_COMPUTER_APPLICATION.
Table 28-1 Computer Application schema
Database Field Name Comment Data Type
AGENT_ID* The GUID of the agent. char(32), not null
DOMAIN_ID* The GUID of the domain to which the char(32), not null
agent belongs.
APP_HASH* The hash value of the learned char(32), not null
application record.
LOCATION_ID* The GUID of the location. char(32), not null
COMPUTER_ID The GUID of the computer. char(32), not null
114 Computer Application data table
Computer Application schema
Table 28-1 Computer Application schema (continued)
Database Field Name Comment Data Type
GROUP_ID The group GUID. char(32), not null
LAST_ACCESS_TIME The last access time of the application bigint, null
on the computer (in GMT).
USN The update serial number; used by bigint, not null
replication.
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflict.
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
1 = Deleted
0 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260), varchar(260), null
RESERVED_BINARY varbinary(2000), null
Chapter 29
Data Handler data table
This chapter includes the following topics:
■ Data Handler schema
Data Handler schema
Table 29-1 describes the database schema for data handler information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_DATA_HANDLER.
Table 29-1 Data Handler schema
Database Field Name Comment Data Type
IDX* Primary Key. char(32), not null
TECH_ID Technology extension. varchar(255), not null
Possible values are as follows:
AvMan
LuMan
legacy
SEP
116 Data Handler data table
Data Handler schema
Table 29-1 Data Handler schema (continued)
Database Field Name Comment Data Type
LF_EXT File extension. varchar(255), not null
Possible values are as follows:
.dat
.AgentStatus
.SecurityRisk
.VirusScans
.VirusLogs
.Inventory
LF_SORT Sort files. tinyint, not null
Possible values are as follows:
0 = Ascending by file modification time
1 = Descending by file modification time
LF_HANDLER Classes that handle data files. varchar(255), not null
Possible values are as follows:
AvMan = com.sygate.scm.server.logreader.av.LogHandler
Legacy agentstatus =
com.sygate.scm.server.logreader.av.AgentStatusHandler
Legacy inventory =
com.sygate.scm.server.logreader.av.InventoryHandler
Legacy security and virus logs =
com.sygate.scm.server.logreader.av.LogHandler
STATE_HANDLER Classes that handle state files. varchar(255), not null
Possible values are as follows:
SEP = com.sygate.scm.server.statereader.sep.StateHandler
AvMan = com.sygate.scm.server.statereader.av.StateHandler
LuMan = com.sygate.scm.server.statereader.lu.StateHandler
Chapter 30
Enforcer Client Logs 1 and
2 data tables
This chapter includes the following topics:
■ Enforcer Client Logs 1 and 2 schema
Enforcer Client Logs 1 and 2 schema
Table 30-1 describes the database schema for the Enforcer Client logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_ENFORCER_CLIENT_LOG_1_LOG_IDX or
I_ENFORCER_CLIENT_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.
Table 30-1 Enforcer Client Logs 1 and 2 schema
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
118 Enforcer Client Logs 1 and 2 data tables
Enforcer Client Logs 1 and 2 schema
Table 30-1 Enforcer Client Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
DOMAIN_ID Not used (logged as char(32), not null
'00000000000000000000000000000000')
SITE_ID The GUID of the site to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
EVENT_ID No event IDs defined, logged as 0. int, not null
EVENT_TIME The event-generated time (in GMT). bigint, not null
ENFORCER_ID The GUID of the Enforcer. char(32), not null
ENFORCER_TYPE Possible values are as follows: tinyint, not null
0 = Gateway Enforcer
1 = LAN Enforcer
2 = DHCP Enforcer
3 = Integrated Enforcer
4 = NAP Enforcer
5 = Peer-to-Peer Enforcer
CLIENT_ID Not used; logged as a 0-length string. char(32), null
REMOTE_HOST The remote host name. varchar(256), null
ACTION The Enforcer's action on this client. It is a hard-coded varchar(256), null
English string that is used as a lookup
Possible values are as follows:
Authenticated = Agent's UID is correct
Rejected = Agent's UID is wrong or there's no agent
running
Disconnected = Agent disconnects from Enforcer or
Enforcer service stops
Passed = Agent has passed Host Integrity check
Failed = Agent has failed Host Integrity check
Enforcer Client Logs 1 and 2 data tables 119
Enforcer Client Logs 1 and 2 schema
Table 30-1 Enforcer Client Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
PERIOD The period in seconds before the Enforcer takes action int, null
on the client. Only valid when action is equal to Rejected
and Disconnected. For other actions, this field must be
0.
EVENT_DESC A description of the event. Usually, first line of the nvarchar(256),
description is treated as “summary.” varchar(256), null
REMOTE_HOST_MAC The remote host MAC address. varchar(17), null
REMOTE_HOST_INFO The remote host information. nvarchar(128),
varchar(128), null
EXTENDED_INFO nvarchar(1024),
varchar(1024), null
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 Peer-to-Peer Enforcer. nvarchar(260),
varchar(260), null
RESERVED_BINARY varbinary(2000), null
LOG_IDX* char(32), null
120 Enforcer Client Logs 1 and 2 data tables
Enforcer Client Logs 1 and 2 schema
Chapter 31
Enforcer Traffic Logs 1 and
2 data table
This chapter includes the following topics:
■ Enforcer Traffic Logs 1 and 2 schema
Enforcer Traffic Logs 1 and 2 schema
Table 31-1 describes the database schema for the Enforcer Traffic logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_ENFORCER_TRAFFIC_LOG_1_LOG_IDX or
I_ENFORCER_TRAFFIC_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.
Table 31-1 Enforcer Traffic Logs 1 and 2 schema
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
122 Enforcer Traffic Logs 1 and 2 data table
Enforcer Traffic Logs 1 and 2 schema
Table 31-1 Enforcer Traffic Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
DOMAIN_ID Not used (logged as char(32), not null
'00000000000000000000000000000000')
SITE_ID The GUID of the site to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
EVENT_ID An event ID from the Symantec Endpoint Protection int, null
agent.
Possible values are as follows:
17 = Incoming traffic blocked
18 = Outgoing traffic blocked
33 = Incoming traffic allowed
34 = Outgoing traffic allowed
EVENT_TIME The event-generated time (in GMT). bigint, not null
ENFORCER_ID The GUID of the Enforcer. char(32), not null
ENFORCER_TYPE Possible values are as follows: tinyint, not null
0 = Gateway Enforcer
1 = LAN Enforcer
2 = DHCP Enforcer
3 = Integrated Enforcer
4 = NAP Enforcer
5 = Peer-to-Peer Enforcer
CLIENT_ID Not used; logged as a 0-length string. char(32), null
LOCAL_HOST_IP The IP address of local computer (IPv4). bigint, not null
REMOTE_HOST_IP The IP address of remote computer (IPv4). bigint, not null
NETWORK_PROTOCOL The protocol type: Enum (OTHERS = 1; TCP = 2; UDP = tinyint, not null
3; ICMP = 4)
LOCAL_PORT The TCP/UDP port in the local computer (host int, not null
byte-order). It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.
Enforcer Traffic Logs 1 and 2 data table 123
Enforcer Traffic Logs 1 and 2 schema
Table 31-1 Enforcer Traffic Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
REMOTE_PORT The TCP/UDP port in the remote computer (host int, not null
byte-order). It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.
TRAFFIC_DIRECTION The direction of the traffic. Enum (unknown = 0; tinyint, not null
inbound = 1; outbound = 2)
BEGIN_TIME The start time of the Enforcer event. bigint, null
END_TIME The end time of the Enforcer event. bigint, null
BLOCKED Specifies if the traffic was blocked. tinyint, not null
Possible values are as follows:
0 = blocked
1 = Not blocked.
Note: The values in this table and those in the
AGENT_TRAFFIC_LOG_x tables are different.
TOTAL_BYTES The total length of all packets in the traffic. int, not null
REPETITION The number of attacks. When a hacker launches a mass int, null
attack, it may be damped to one event by the log system.
ALERT Reserved. tinyint, not null
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260),
varchar(260), null
RESERVED_BINARY varbinary(2000), null
LOG_IDX* char(32), null
124 Enforcer Traffic Logs 1 and 2 data table
Enforcer Traffic Logs 1 and 2 schema
Chapter 32
Enforcer System Logs 1 and
2 data tables
This chapter includes the following topics:
■ Enforcer System Logs 1 and 2 schema
Enforcer System Logs 1 and 2 schema
Table 32-1 describes the database schema for the Enforcer System logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_ENFORCER_SYSTEM_LOG_1_LOG_IDX or
I_ENFORCER_SYSTEM_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.
Table 32-1 Enforcer System Logs 1 and 2 schema
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
126 Enforcer System Logs 1 and 2 data tables
Enforcer System Logs 1 and 2 schema
Table 32-1 Enforcer System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
SITE_ID The GUID of the site to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
Enforcer System Logs 1 and 2 data tables 127
Enforcer System Logs 1 and 2 schema
Table 32-1 Enforcer System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
EVENT_ID int, null
128 Enforcer System Logs 1 and 2 data tables
Enforcer System Logs 1 and 2 schema
Table 32-1 Enforcer System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
An event ID from the Symantec Endpoint Protection
agent (in hex).
Possible values are as follows:
0x101 = Connected to Symantec Endpoint Protection
Manager
0x102 = Lost connection to Symantec Endpoint
Protection Manager
0x103 = Applied a policy that was downloaded from
Symantec Endpoint Protection Manager
0x104 = Failed to apply a policy that was downloaded
from Symantec Endpoint Protection Manager
0x107 = Applied management server configuration
0x108 = Failed to apply the management server
configuration
0x110 = Registered to the NAP management server
0x111 = Unregistered from the NAP management server
0x112 = Failed to register to the NAP management
server
0x201 = Enforcer started
0x202 = Enforcer stopped
0x203 = Enforcer paused
0x204 = Enforcer resumed
0x205 = Enforcer disconnected from server
0x301 = Enforcer failover enabled
0x302 = Enforcer failover disabled
0x303 = Enforcer in standby mode
0x304 = Enforcer in primary mode
0x305 = Enforcer short
0x306 = Enforcer loop
0x401 = Forward engine pause
0x402 = Forward engine start
0x403 = DNS Enforcer enabled
Enforcer System Logs 1 and 2 data tables 129
Enforcer System Logs 1 and 2 schema
Table 32-1 Enforcer System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
0x404 = DNS Enforcer disabled
0x405 = DHCP Enforcer enabled
0x406 = DHCP Enforcer disabled
0x407 = Allow all enabled
0x408 = Allow all disabled
0x501 = Seat number change
0x601 = Failed to create a policy parser
0x602 = Failed to import a policy that was downloaded
from Symantec Endpoint Protection Manager
0x603 = Failed to export a policy that was downloaded
from Symantec Endpoint Protection Manager
0x701 = Incorrect customized attribute
EVENT_TIME The event-generated time (in GMT). bigint, not null
ENFORCER_ID GUID of the Enforcer char(32), not null
ENFORCER_TYPE Possible values are as follows: tinyint, not null
0 = Gateway Enforcer
1 = LAN Enforcer
2 = DHCP Enforcer
3 = Integrated Enforcer
4 = NAP Enforcer
5 = Peer-to-Peer Enforcer
SEVERITY The type of event. int, not null
Possible values are as follows:
0 = INFO
1 = WARNING
2 = ERROR
3 = FATAL
EVENT_DESC A description of the event. Usually, the first line of the nvarchar(256),
description is treated as “summary". varchar(256), null
130 Enforcer System Logs 1 and 2 data tables
Enforcer System Logs 1 and 2 schema
Table 32-1 Enforcer System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260),
varchar(260), null
RESERVED_BINARY varbinary(2000), null
LOG_IDX* The log index unique ID. char(32), null
Chapter 33
Firewall Report data table
This chapter includes the following topics:
■ Firewall Report schema
Firewall Report schema
Table 33-1 describes the database schema for firewall report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_FIREWALLREPORT.
Table 33-1 Firewall Report schema
Database Field Name Comment Data Type
FIREWALLFILTER_IDX* Primary Key. char(32), not null
USER_ID The GUID of the user who created this char(32), not null
filter.
FILTERNAME The filter name. nvarchar(255), varchar(255), not null
STARTDATEFROM The start date. datetime, not null
STARTDATETO The end date. datetime, not null
132 Firewall Report data table
Firewall Report schema
Table 33-1 Firewall Report schema (continued)
Database Field Name Comment Data Type
RELATIVEDATETYPE Possible values are as follows: int, not null
0 = past week
1 = past month
2 = past three months
3 = past year
4 = past 24 hours
5 = current month
FIREWALLTYPE Possible values are as follows: int, null
1 = Traffic
2 = Packets
SEVERITY Possible values are as follows: int, null
1 = Critical
5 = Major
9 = Minor
13 = Info
EVENTTYPE Events for Traffic. int, null
Possible values are as follows:
307 = Ethernet packet
306 = ICMP packet
308 = IP packet
303 = Ping request
301 = TCP initiated
304 = TCP completed
302 = UDP datagram
305 = Other
Events for Packet:
401 = Raw Ethernet
Firewall Report data table 133
Firewall Report schema
Table 33-1 Firewall Report schema (continued)
Database Field Name Comment Data Type
BLOCKED Possible values are as follows: int, null
1 = Blocked
0 = Not blocked
PROTOCOL Possible values are as follows: int, null
1 = Other
2 = TCP
3 = UDP
4 = ICMP
DIRECTION Possible values are as follows: int, null
1 = Inbound
2 = Outbound
0 = Unknown
LOCALPORT The port number. int, null
SITELIST Comma-separated site names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
SERVERGROUPLIST Comma-separated domain names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
CLIENTGROUPLIST Comma-separated group names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
PARENTSERVERLIST Comma-separated server names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
COMPUTERLIST Comma-separated computer names nvarchar(512), varchar(512), not null
by which to filter. These names can
contain wildcard characters.
IPADDRESSLIST Comma-separated IP list by which to nvarchar(255), varchar(255), not null
filter. These names can contain
wildcard characters.
134 Firewall Report data table
Firewall Report schema
Table 33-1 Firewall Report schema (continued)
Database Field Name Comment Data Type
REMOTEHOSTLIST Comma-separated remote computer nvarchar(255), varchar(255), not null
names by which to filter.
REMOTEIPADDRLIST Comma-separated remote IP list by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
USERLIST Comma-separated user names by nvarchar(255), varchar(255), not null
which to filter. These names can
contain wildcard characters.
SORTORDER The column in the table to sort by. varchar(32), not null
SORTDIR The direction in which to sort. varchar(5), not null
Possible values are as follows:
DESC = Descending
ASC = Ascending
LIMITROWS The number of rows to use for int, not null
pagination.
USERELATIVE Use relative dates ('on') or absolute char(2), not null
dates.
REPORT_IDX Not used. int, not null
REPORTINPUTS Special parameters if report needs nvarchar(64), varchar(64), not null
them
USN A USN-based serial number; this ID bigint, not null
is not unique.
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
DELETED Delete row. tinyint, not null
0 = Not deleted
1 = Deleted
FULL_CHARTS Not used. varchar(255), not null
Chapter 34
GUI Parameters data table
This chapter includes the following topics:
■ GUI Parameters schema
GUI Parameters schema
Table 34-1 describes the database schema for GUI parameters information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_GUIPARMS.
Table 34-1 GUI Parameters schema
Database Field Name Comment Data Type
GUIPARMS_IDX* Primary Key. int, not null
PARAMETER The parameter name. varchar(255), not null
VALUE The parameter value. nvarchar(255), varchar(255), not null
USN A USN-based serial number; this ID bigint, not null
is not unique.
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
136 GUI Parameters data table
GUI Parameters schema
Table 34-1 GUI Parameters schema (continued)
Database Field Name Comment Data Type
DELETED Delete row: tinyint, not null
0 = Not deleted
1 = Deleted
Chapter 35
History data table
This chapter includes the following topics:
■ History schema
History schema
Table 35-1 describes the database schema for history information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_HISTORY.
Table 35-1 History schema
Database Field Name Comment Data Type
HISTORY_IDX* Primary Key, Index. char(32), not null
HISTORYCONFIG_IDX Pointer to the History Configuration char(32), not null
table.
EVENT_DATETIME The snapshot time in GMT. bigint, not null
STAT_TYPE The kind of data; a hard-coded varchar(64), not null
English key.
TARGET The data. nvarchar(256), varchar(256), not null
STATISTIC Summary statistic. nvarchar(256), varchar(256), not null
138 History data table
History schema
Chapter 36
History Configuration data
table
This chapter includes the following topics:
■ History Configuration schema
History Configuration schema
Table 36-1 describes the database schema for history configuration information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_HISTORYCONFIG.
Table 36-1 History Configuration schema
Database Field Name Comment Data Type
HISTORYCONFIG_IDX* Primary Key. char(32), not null
USER_ID The GUID of the user who created this scheduled char(32), not null
report.
TZ_OFFSET The time zone that is offset from when the int, not null
administrator creates the scheduled report so that data
can be formatted to the administrator's local time.
FILTERNAME The filter that is used by this scheduled report. nvarchar(255),
varchar(255), not null
140 History Configuration data table
History Configuration schema
Table 36-1 History Configuration schema (continued)
Database Field Name Comment Data Type
REPORT_IDX varchar(10), not null
History Configuration data table 141
History Configuration schema
Table 36-1 History Configuration schema (continued)
Database Field Name Comment Data Type
Format is Reporttype-number. For example, I-0 is the
Virus Definitions Distribution.
Possible values are as follows:
I = Computer Status Report
0 = Virus Definitions Distribution
1 = Computers Not Checked Into Server
2 = Symantec Endpoint Protection Product Versions
3 = Intrusion Prevention Signature Distribution
4 = Client Inventory
5 = Compliance Status Distribution
6 = Client Online Status
7 = Clients With Latest Policy
8 = Client Count by Group
9 = Security Status Summary
10 = Protection Content Versions
11 =Client Migration
100 = Client Software Rollout (Snapshots)
101 = Clients Online/Offline Over Time (Snapshots)
102 = Clients With Latest Policy Over Time (Snapshots)
103 = Non-Compliant Clients Over Time (Snapshots)
104 = Virus Definition Rollout (Snapshots)
A = Audit Report
0 = Policies Used
B = Application and Device Control Report
0 = Top Groups With Most Alerted Application Control
Logs
1 = Top Targets Blocked
2 = Top Devices Blocked
C = Compliance Report
0 = Network Compliance Status
142 History Configuration data table
History Configuration schema
Table 36-1 History Configuration schema (continued)
Database Field Name Comment Data Type
1 = Compliance Status
2 = Clients by Compliance Failure Summary
3 = Compliance Failure Details
4 = Non-compliant Clients by Location
F = Network Threat Protection Report
0 = Top Targets Attacked
1 = Top Sources of Attack
2 = Top Types of Attack
3 = Top Blocked Applications
4 = Attacks Over Time
5 = Security Events by Severity
6 = Blocked Applications Over Time
7 = Traffic Notifications Over Time
8 = Top Traffic Notifications
9 = Full Report
R = Risk Report
0 = Infected and At Risk Computers
1 = Detection Action Summary
2 = Risk Detections Count
3 = New Risks Detected in the Network
4 = Top Risk Detections Correlation
5 = Risk Distribution Summary
6 = Risk Distribution Over Time
8 = Proactive Threat Detection Results
9 = Proactive Threat Distribution
10 = Proactive Threat Detection Over Time
11 = Action Summary for Top Risks
12 = Number of Notifications
14 = Number of Notifications Over Time
13 = Weekly Outbreaks
History Configuration data table 143
History Configuration schema
Table 36-1 History Configuration schema (continued)
Database Field Name Comment Data Type
7 = Comprehensive Risk Report
S = Scan Report
0 = Scan Statistics Histogram
1 = Computers by Last Scan Time
2 = Computers Not Scanned
Y = System Report
0 = Top Clients That Generate Errors
1 = Top Servers That Generate Errors
2 = Top Enforcers That Generate Errors
3 = Database Replication Failures Over Time
4 =Site Status Report
STARTTIME When to start generating the report; this establishes datetime, not null
its scheduled time within the repeat schedule.
LASTRUN When the report was last generated ( in GMT). bigint, not null
RUNHOURS Repeat schedule for this report in hours, for example: int, not null
1 = Every 1 hour
24 = Every 1 day
168 = Every week
720 = Every month
NAME The name of this scheduled report. nvarchar(255),
varchar(255), not null
EMAIL A comma-separated list of email addresses to send the nvarchar(255),
report to. varchar(255), not null
DESCRIPTION Administrator-provided description for this report. nvarchar(255),
varchar(255), not null
DISABLED Specifies whether the scheduled report is disabled or tinyint, not null
not.
Possible values are as follows:
0 = No
1 = Yes
144 History Configuration data table
History Configuration schema
Table 36-1 History Configuration schema (continued)
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = Not Deleted
1 = Deleted
Chapter 37
Home Page Configuration
data table
This chapter includes the following topics:
■ Home Page Configuration schema
Home Page Configuration schema
Table 37-1 describes the database schema for home page configuration
information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_HOMEPAGECONFIG.
Table 37-1 Home Page Configuration schema
Database Field Name Comment Data Type
HOMEPAGECONFIG_IDX* Primary Key. char(32), not null
USER_NAME The Admin GUID. char(32), not null
PARAMETER The parameter name. varchar(255), not null
VALUE The parameter value. nvarchar(255),
varchar(255), not null
USN A USN-based serial number; this ID is not unique. bigint, not null
146 Home Page Configuration data table
Home Page Configuration schema
Table 37-1 Home Page Configuration schema (continued)
Database Field Name Comment Data Type
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = Not Deleted
1 = Deleted
Chapter 38
HPP Alerts data table
This chapter includes the following topics:
■ HPP Alerts schema
HPP Alerts schema
Table 38-1 describes the database schema for the TruScan proactive threat scan
event information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_HPP_ALERTS.
Table 38-1 HPP Alerts schema
Database Field Name Comment Data Type
IDX* Primary Key. char(32), not null
SENSITIVITY The engine sensitivity setting that tinyint, not null
produced the detection (0...100).
DETECTION_SCORE The score of the detection (0...100). tinyint, not null
COH_ENGINE_VERSION The version of the TruScan engine. varchar(64), not null
148 HPP Alerts data table
HPP Alerts schema
Table 38-1 HPP Alerts schema (continued)
Database Field Name Comment Data Type
DIS_SUBMIT The recommendation of whether or tinyint, not null
not this detection should be
submitted to Symantec.
Possible values are as follows:
0 = No
1 = Yes
WHITELIST_REASON The reason for whitelisting. int, not null
Possible values are as follows:
0 = Not on the permitted application
list
100 = Symantec permitted application
list
101 = Administrator permitted
application list
102 = User permitted application list
USN A USN-based serial number; this ID bigint, not null
is not unique.
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = Not Deleted
1 = Deleted
Chapter 39
HPP Application data table
This chapter includes the following topics:
■ HPP Application schema
HPP Application schema
Table 39-1 describes the database schema for information for the applications
that TruScan proactive threat scans detect.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_HPP_APPLICATION.
Table 39-1 HPP Application schema
Database Field Name Comment Data Type
APP_IDX* Primary Key. char(32), not null
APP_HASH The hash for this application. varchar(64), not null
HASH_TYPE The hash algorithm that was used. tinyint, not null
Possible values are as follows:
0 = MD5
1 = SHA-1
2 = SHA-256
COMPANY_NAME The company name. nvarchar(260), varchar(260), not null
150 HPP Application data table
HPP Application schema
Table 39-1 HPP Application schema (continued)
Database Field Name Comment Data Type
APP_NAME The application name. nvarchar(260), varchar(260), not null
APP_VERSION The application version. nvarchar(256), varchar(256), not null
APP_TYPE The application type. int, not null
Possible values are as follows:
0 = Trojan horse worm
1 = Trojan horse worm
2 = Key logger
100 = Remote control
FILE_SIZE The file size. bigint, not null
DETECTION_TYPE The detection type. tinyint, not null
Possible values are as follows:
0 = heuristic
1 = commercial application
USN A USN-based serial number; this ID bigint, not null
is not unique.
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = Not Deleted
1 = Deleted
HELP_VIRUS_IDX Foreign key to VIRUS table, which char(32), null
provides a help ID for online
Symantec write-up.
Chapter 40
Identity Map data table
This chapter includes the following topics:
■ Identity Map schema
Identity Map schema
Table 40-1 describes the database schema for identity map information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_IDENTITY_MAP.
Table 40-1 Identity Map schema
Database Field Name Comment Data Type
ID* The GUID of an object. char(32), not null
NAME The name of the object. nvarchar(2000), varchar(2000), null
TYPE The Object Type Name. varchar(256), null
DOMAIN_ID The GUID of the domain. char(32), null
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
152 Identity Map data table
Identity Map schema
Table 40-1 Identity Map schema (continued)
Database Field Name Comment Data Type
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260), varchar(260), null
RESERVED_BINARY varbinary(2000), null
Chapter 41
Inventory Current Risk data
table
This chapter includes the following topics:
■ Inventory Current Risk schema
Inventory Current Risk schema
Table 41-1 describes the database schema for inventory current risk information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_INVENTORYCURRENTRISK.
Table 41-1 Inventory Current Risk schema
Database Field Name Comment Data Type
COMPUTER_IDX* Foreign key to char(32), not null
SEM_COMPUTER.COMPUTER_ID.
ALERT_EVENT_IDX* Foreign key to ALERTS.IDX. char(32), not null
USN A USN-based serial number; this ID bigint, not null
is not unique.
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
154 Inventory Current Risk data table
Inventory Current Risk schema
Table 41-1 Inventory Current Risk schema (continued)
Database Field Name Comment Data Type
DELETED Deleted row: tinyint, not null
0 = Not Deleted
1 = Deleted
Chapter 42
Inventory Current Virus
data table
This chapter includes the following topics:
■ Inventory Current Virus schema
Inventory Current Virus schema
Table 42-1 describes the database schema for inventory current virus information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_INVENTORYCURRENTVIRUS.
Table 42-1 Inventory Current Virus schema
Database Field Name Comment Data Type
COMPUTER_IDX* Foreign key to SEM_COMPUTER.COMPUTER_ID. char(32), not null
ALERT_EVENT_IDX* Foreign key to ALERTS.IDX. char(32), not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
156 Inventory Current Virus data table
Inventory Current Virus schema
Table 42-1 Inventory Current Virus schema (continued)
Database Field Name Comment Data Type
DELETED Deleted row tinyint, not null
0 = Not Deleted
1 = Deleted
Chapter 43
Inventory Report data table
This chapter includes the following topics:
■ Inventory Report schema
Inventory Report schema
Table 43-1 describes the database schema for inventory report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_INVENTORYREPORT.
Table 43-1 Inventory Report schema
Database Field Name Comment Data Type
INVENTORYFILTER_IDX* Primary Key. char(32), not null
USER_ID The administrator GUID. char(32), not null
FILTERNAME User-specified name for this saved filter nvarchar(255), varchar(255),
not null
LASTCHECKINTIME The last time of check in with management server. datetime, not null
158 Inventory Report data table
Inventory Report schema
Table 43-1 Inventory Report schema (continued)
Database Field Name Comment Data Type
LASTSCANTIME The last time that the computer was scanned. int, null
Possible values are as follows:
0 = past week
1 = past month
2 = past three months
3 = past year
4 = past 24 hours
5 = current month
RELATIVEDATETYPE The last check in time, if relative filtering was int, not null
used.
Possible values are as follows:
0 = past week
1 = past month
2 = past three months
3 = past year
4 = past 24 hours
5 = current month
OPERATOR Not used. tinyint, not null
PATTERN_IDX A hard-coded English string that is used as key varchar(255), not null
(filters for Antivirus signature version).
Possible values are as follows:
WITHIN_RELATIVE_30 = Within the last 30 days
WITHIN_RELATIVE_90 = Within the last 90 days
OUTSIDE_RELATIVE_30 = Older than the last 30
days
OUTSIDE_RELATIVE_90 = Older than the last 90
days
or a virus definition revision that results in an <
= query on that revision.
PRODUCTVERSION The product version by which to filter. varchar(32), not null
Inventory Report data table 159
Inventory Report schema
Table 43-1 Inventory Report schema (continued)
Database Field Name Comment Data Type
PROFILE_VERSION The profile version by which to filter varchar(64), not null
IDS_VERSION The intrusions detection system signature version varchar(64), not null
by which to filter.
GOOD Not used. varchar(5), not null
LICENSE_STATUS Not used. tinyint, null
STATUS Possible values are as follows: tinyint, null
1 = online
0 = offline
127 = No filter (all)
ONOFF Auto-Protect Status. tinyint, null
Possible values are as follows:
0 = filter for off
127 = No filter (all)
TAMPER_ONOFF Tamper Protection Status. tinyint, null
Possible values are as follows:
0 = filter for off
127 = No filter (all)
REBOOT_REQUIRED Restart Required Status. tinyint, null
Possible values are as follows:
1 = filter for needs restart
127 = No filter (all)
AVENGINE_ONOFF Antivirus Engine Status. tinyint, null
Possible values are as follows:
0 = filter for off
127 = No filter (all)
160 Inventory Report data table
Inventory Report schema
Table 43-1 Inventory Report schema (continued)
Database Field Name Comment Data Type
TPM_DEVICE TPM device installed. tinyint, null
Possible values are as follows:
1 = filters on device is installed
127 = No filter (all)
SERVERGROUPLIST A comma-separated list of domain names by nvarchar(255), varchar(255),
which to filter. These names can contain wildcard not null
characters.
CLIENTGROUPLIST A comma-separated list of group names by which nvarchar(255), varchar(255),
to filter. These names can contain wildcard not null
characters.
PARENTSERVERLIST A comma-separated list of server names by which nvarchar(255), varchar(255),
to filter. These names can contain wildcard not null
characters.
SITELIST A comma-separated list of site names by which nvarchar(255), varchar(255),
to filter. These names can contain wildcard not null
characters.
R_OS_TYPE Possible values are as follows: int, null
600 = Windows Vista and Windows Server 2008
502 = Windows 2003 and Windows XP 64 bit
501 = Windows XP
500 = Windows 2000
400 = Windows NT
000 = Other
-1 = No filter (all)
HI_STATUS Filters on the following compliance statuses: tinyint, null
0 = Fail
1 = Success
2 = Pending
3 = Disabled
4 = Ignore
127 = No filter (all)
Inventory Report data table 161
Inventory Report schema
Table 43-1 Inventory Report schema (continued)
Database Field Name Comment Data Type
HI_REASONCODE Filters on the following reasons: int, null
0 = Pass
101 = Antivirus version is out-of-date
102 = Antivirus is not running
103 = Script failed
104 = Check is incomplete
105 = Check is disabled
127 = Location changed
- 1 = No filter (all)
SERVICE_PACK OS service pack or % for no filter (all). nvarchar(64), varchar(64), not
null
WORSTINFECTION_IDX Not used. int, null
COMPUTERLIST A comma-separated, wild-carded list of computer nvarchar(512), varchar(512),
names by which to filter. These names can contain not null
wildcard characters.
IDADDRESSLIST A comma-separated, wild-carded list of IP nvarchar(255), varchar(255),
addresses by which to filter. These names can not null
contain wildcard characters.
USERLIST A comma-separated, wild-carded list of user nvarchar(255), varchar(255),
names by which to filter. These names can contain not null
wildcard characters.
INFECTED On = filter for infected machines varchar(2), not null
SORTORDER The column to use to sort for the Computer Status varchar(32), not null
log.
SORTDIR Ascending or descending. varchar(5), not null
FILVIEW Not used. varchar(16), not null
CLIENTTYPE Not used. varchar(32), not null
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
REPORT_IDX Not used. int, not null
162 Inventory Report data table
Inventory Report schema
Table 43-1 Inventory Report schema (continued)
Database Field Name Comment Data Type
REPORTINPUTS Special parameters if a report needs them. nvarchar(64), varchar(64), not
null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered bigint, not null
or modified in the database, in milliseconds since
1970.
DELETED Deleted row tinyint, not null
0 = Not Deleted
1 = Deleted
FIREWALL_ONOFF Network Threat Protection Status. tinyint, null
Possible values are as follows:
0 = filter for off
127 = No filter (all)
Chapter 44
LAN Device Detected data
table
This chapter includes the following topics:
■ LAN Device Detected schema
LAN Device Detected schema
The LAN Device Detected data table is not used in Symantec Network Access
Control.
Table 44-1 describes the database schema for LAN Device Detected information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_LAN_DEVICE_DETECTED.
Table 44-1 LAN Device Detected schema
Database Field Name Comment Data Type
LAN_DEVICE_ID The GUID of the device. char(32), not null
AGENT_ID The GUID of the agent. char(32), not null
COMPUTER_ID The GUID of the client computer. char(32), not null
HASH* Link with the computer char(32), not null
HARDWARE_KEY, Group GUID.
164 LAN Device Detected data table
LAN Device Detected schema
Table 44-1 LAN Device Detected schema (continued)
Database Field Name Comment Data Type
MAC_ADDRESS* The MAC address of the device. varchar(18), not null
IP_ADDRESS The IP Address of the device. bigint, not null
DEVICE_DETECTED_TIME The GUID of the domain. bigint, null
ALERT Reserved. tinyint, null
SEND_SNMP_TRAP Reflects the send SNMP trap action. tinyint, null
SEND_SNMP_TRAP is true if send is
true.
USN The update serial number; used by bigint, not null
replication.
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflict.
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
1 = Deleted
0 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 varchar(260), null
RESERVED_BINARY varbinary(2000), null
Chapter 45
LAN Device Excluded data
table
This chapter includes the following topics:
■ LAN Device Excluded schema
LAN Device Excluded schema
The LAN Device Excluded data table is not used in Symantec Network Access
Control.
Table 45-1 describes the database schema for LAN Device Excluded information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_LAN_DEVICE_EXCLUDED.
Table 45-1 LAN Device Excluded schema
Database Field Name Comment Data Type
EXCLUDED_ID* The GUID of the record. char(32), not null
HASH Link with the computer char(32), not null
HARDWARE_KEY, Group GUID.
EXCLUDE_MODE tinyint, not null
MAC_ADDRESS The MAC address of the device. varchar(18), null
166 LAN Device Excluded data table
LAN Device Excluded schema
Table 45-1 LAN Device Excluded schema (continued)
Database Field Name Comment Data Type
IP_ADDRESS The IP Address of the device. bigint, null
SUBNET_MASK The subnet mask of the device. bigint, null
IP_RANGE_START The start of IP Address range. bigint, null
IP_RANGE_END The end of IP Address range. bigint, null
USN The update serial number; used by bigint, not null
replication.
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve merge
conflicts.
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
0 = Deleted
1 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 varchar(260), null
RESERVED_BINARY varbinary(2000), null
Chapter 46
Legacy Agent data table
This chapter includes the following topics:
■ Legacy Agent schema
Legacy Agent schema
The Legacy Agent data table is not used in Symantec Network Access Control.
Table 46-1 describes the database schema for legacy agent information, which is
used for product migration.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_LEGACY_AGENT.
Table 46-1 Legacy Agent schema
Database Field Name Comment Data Type
LEGACY_AGENT_ID* The agent ID from a version 5.x agent. char(32), not null
Primary Key.
GROUP_PATH The group full path in SEM5. char(260), not null
POLICY_MODE User/Computer mode. int, not null
LAN_SENSOR If the Agent is a LAN_SENSOR. int, not null
CLIENT_ID The GUID in the SEM_CLIENT table. char(32), not null
168 Legacy Agent data table
Legacy Agent schema
Table 46-1 Legacy Agent schema (continued)
Database Field Name Comment Data Type
COMPUTER_ID The GUID in the SEM_COMPUTER char(32), not null
table.
AGENT_ID The GUID in the SEM_AGENT table. char(32), not null
USN Update serial number; used by bigint, not null
replication.
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve merge
conflicts.
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
1 = Deleted
0 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260), varchar(260), null
RESERVED_BINARY varbinary(2000), null
Chapter 47
Local Metadata data table
This chapter includes the following topics:
■ Local Metadata schema
Local Metadata schema
Table 47-1 describes the database schema for local metadata information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_LOCAL_METADATA.
Table 47-1 Local Metadata schema
Database Field Name Comment Data Type
ID* The GUID. char(32), not null
TYPE The type of local_metadata. varchar(256), null
Supports only SemLocalSettings at
this moment.
CHECKSUM The checksum of the XML content. char(32), null
CONTENT The XML content of the schema image, null
object.
170 Local Metadata data table
Local Metadata schema
Table 47-1 Local Metadata schema (continued)
Database Field Name Comment Data Type
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
0 = Deleted
1 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260), varchar(260), null
RESERVED_BINARY varbinary(2000), null
Chapter 48
Log Configuration data
table
This chapter includes the following topics:
■ Log Configuration schema
Log Configuration schema
Table 48-1 describes the database schema for log configuration information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_LOG_CONFIG.
172 Log Configuration data table
Log Configuration schema
Table 48-1 Log Configuration schema
Database Field Name Comment Data Type
LOG_TYPE* Type of the logs. int, not null
Possible values are as follows:
101 = SERVER_SYSTEM_LOG
102 = SERVER_ADMIN_LOG
103 = SERVER_POLICY_LOG
104 = SERVER_CLIENT_LOG
105 = SERVER_ENFORCER_LOG
201 = AGENT_SYSTEM_LOG
202 = AGENT_SECURITY_LOG
203 = AGENT_TRAFFIC_LOG
204 = AGENT_PACKET_LOG
205 = AGENT_BEHAVIOR_LOG
301 = ENFORCER_SYSTEM_LOG
302 = ENFORCER_CLIENT_LOG
303 = ENFORCER_TRAFFIC_LOG
TABLE_LIST The name of the tables to switch logs. varchar(250), not null
THRESHOLD The threshold of the log count. int, not null
EXPIRATION The expiration date of the logs. int, not null
CURRENT_TABLE The current log table name. varchar(60), not null
CURRENT_ROWS The current log count in the log table. int, not null
SWITCH_TIME The last log switch time. bigint, null
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
Log Configuration data table 173
Log Configuration schema
Table 48-1 Log Configuration schema (continued)
Database Field Name Comment Data Type
RESERVED_varchar1 nvarchar(260), varchar(260), null
RESERVED_BINARY varbinary(2000), null
174 Log Configuration data table
Log Configuration schema
Chapter 49
Network Scan data table
This chapter includes the following topics:
■ Network Scan schema
Network Scan schema
Table 49-1 describes the database schema for network scan information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_NETWORK_SCAN.
Table 49-1 Network Scan schema
Database Field Name Comment Data Type
ID* The GUID of the network scan. char(32), not null
DESCRIPTION An optional description of the nvarchar(512), null
network scan.
SCAN_TIME The time when the network scan is bigint, not null
added into the database, in
milliseconds since 1970.
ADMIN_ID The administrator who starts the char(32), not null
network scan.
USN The update serial number; used by bigint, not null
replication.
176 Network Scan data table
Network Scan schema
Table 49-1 Network Scan schema (continued)
Database Field Name Comment Data Type
TIME_STAMP The time when the command was bigint, not null
added into the database, in
milliseconds since 1970.
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
1 = Deleted
0 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 varchar(260), null
RESERVED_BINARY varbinary(1000), null
Chapter 50
Network Scan Result data
table
This chapter includes the following topics:
■ Network Scan Result schema
Network Scan Result schema
Table 50-1 describes the database schema for network scan result information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_NETWORK_SCAN_RESULT.
Table 50-1 Network Scan Result schema
Database Field Name Comment Data Type
ID* The GUID of the network scan. char(32), not null
IP_ADDR The IP address of scanned computer. bigint, not null
COMPUTER_NAME The computer name of scanned nvarchar(512), null
computer if the name can be resolved.
DESCRIPTION The computer’s operating system, the nvarchar(512), null
operating system version, and the
platform.
SOFTWARE The name of the detected software. nvarchar(512), null
178 Network Scan Result data table
Network Scan Result schema
Table 50-1 Network Scan Result schema (continued)
Database Field Name Comment Data Type
CLIENT_ID The GUID in the SEM_CLIENT table. char(32), null
STATUS The scan status code of the client. tinyint, not null
USN The update serial number; used by bigint, not null
replication.
TIME_STAMP The time when the command is added bigint, not null
into the database, in milliseconds
since 1970.
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
1 = Deleted
0 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 varchar(260), null
RESERVED_BINARY varbinary(1000), null
Chapter 51
Notification data table
This chapter includes the following topics:
■ Notification schema
Notification schema
Table 51-1 describes the database schema for notification information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_NOTIFICATION.
Table 51-1 Notification schema
Database Field Name Comment Data Type
NOTAG_IDX* Primary Key, Index of notification. char(32), not null
180 Notification data table
Notification schema
Table 51-1 Notification schema (continued)
Database Field Name Comment Data Type
TYPE Possible values are as follows: varchar(30), not null
VO = Risk outbreak
SO = Outbreak on single computers
VM = Outbreak by number of computers
1V = Single risk event
NV = New risk detected
ID = Virus definitions out-of-date
AF = Authentication failure
AFS = Authentication failure on a single server
SE = System event
CS = Client security alert
CSS = Client security alert on individual computers
CSM = Client security alert by number of computers
LA = New learned application
CL = Client list changed
DF = Server health
UM = Unmanaged computers
NS = New software package
ED = Enforcer is down
WL = Forced or Commercial application detected
USER_ID The administrator GUID. char(32), not null
TZ_OFFSET The time zone when the administrator created the int, not null
notification so that emailed reports can display dates
in the administrator's local time zone.
SERVERGROUP The name(s) of the server group(s) to which this nvarchar(255),
notification applies. A comma-separated list that allows varchar(255), not null
wildcard characters.
CLIENTGROUP The name(s) of the client group(s) to which this nvarchar(255),
notification applies. A comma-separated list that allows varchar(255), not null
wildcard characters.
Notification data table 181
Notification schema
Table 51-1 Notification schema (continued)
Database Field Name Comment Data Type
PARENTSERVER The name(s) of the parent server(s) to which this nvarchar(255),
notification applies. A comma-separated list that allows varchar(255), not null
wildcard characters.
COMPUTER The name(s) of the computer(s) to which this nvarchar(255),
notification applies. varchar(255), not null
VIRUS The name(s) of the virus(es) to which this notification nvarchar(255),
applies. A comma-separated list that allows wildcard varchar(255), not null
characters.
SOURCE The scan to which this notification applies. A varchar(255), not null
hard-coded English string that is used as key.
Possible values are as follows:
% = all
Scheduled Scan
Manual Scan
Real Time Scan
Heuristic Scan
Console
Definition downloader
System
Startup Scan
Idle Scan
Manual Quarantine
182 Notification data table
Notification schema
Table 51-1 Notification schema (continued)
Database Field Name Comment Data Type
ACTACTION Possible values are as follows: varchar(255), not null
% = No filter (all)
1 = Quarantined
3 = Deleted
4 = Left alone
5 = Cleaned
6 = Cleaned or macros deleted
14 = Pending repair
15 = Partially repaired
16 = Process termination pending restart
17 = Excluded
19 = Cleaned by deletion
20 = Access denied
21 = Process terminated
22 = No repair available
23 = All actions failed
98 = Suspicious
HYPERLINK2 The hyperlink used to generate report. nvarchar(255),
varchar(255), not null
NTIMES The number of occurrences that must occur to trigger int, not null
this notification.
XMINUTES The time window in which ntimes events must occur int, not null
to trigger the notification.
EMAIL A comma-separated email list to send email to when nvarchar(255),
this notification is triggered. varchar(255), not null
LASTRUN The time stamp when this notification was last bigint, not null
analyzed.
TRIGGERED The time when the alert was last triggered. bigint, not null
LASTRUN_DATA Any extra data that is needed to give details in the varchar(50), not null
notification email.
Notification data table 183
Notification schema
Table 51-1 Notification schema (continued)
Database Field Name Comment Data Type
CATEGORY The virus category to which this notification applies. varchar(10), not null
Possible values are as follows:
>= -1 is no filter (all)
>= 1 filters for Category 1 (Very Low) and above
>= 2 filters for Category 2 (Low) and above
>= 3 filters for Category 3 (Moderate) and above
>= 4 filters for Category 4 (Severe) and above
>= 5 filters for Category 5 (Very Severe)
= -1 filters for unknown
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = Not Deleted
1 = Deleted
SYSTEM_EVENT Which groups of system events. int, not null
SECURITY_EVENT Which groups of security events. int, not null
DAMPER The minimum quiet time between alerts in minutes; 0 int, not null
means autodamper, which is 60 minutes
BATCH_FILE_NAME The batch file or executable to be executed when the nvarchar(64),
notification is triggered. varchar(64), not null
NAME The name of notification configuration. nvarchar(255),
varchar(255), not null
184 Notification data table
Notification schema
Chapter 52
Notification Alerts data
table
This chapter includes the following topics:
■ Notification Alerts schema
Notification Alerts schema
Table 52-1 describes the database schema for notification alerts information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_NOTIFICATIONALERTS.
Table 52-1 Notification Alerts schema
Database Field Name Comment Data Type
IDX* Primary Key, Index of notification char(32), not null
alert.
NOTAG_IDX The notification that triggered this char(32), not null
alert. A pointer to table 'notification'.
ALERTDATETIME The time stamp when the alert was datetime, not null
generated.
SUBJECT The subject of the alert. nvarchar(255), varchar(255), not null
MSG The notification alert message text. nvarchar(512), varchar(512), not null
186 Notification Alerts data table
Notification Alerts schema
Table 52-1 Notification Alerts schema (continued)
Database Field Name Comment Data Type
HYPERLINK The link to the report with details nvarchar(512), varchar(512), not null
about the alert situation.
ACKNOWLEDGED The flag that indicates whether the int, not null
alert has been acknowledged.
ACKNOWLEDGED_USERID The GUID of the user who char(32), not null
acknowledged this notification.
ACKNOWLEDGED_TIME The time when the notification was datetime, not null
acknowledged.
USN A USN-based serial number; this ID bigint, not null
is not unique.
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = Not deleted
1 = deleted
Chapter 53
Pattern data table
This chapter includes the following topics:
■ Pattern schema
Pattern schema
Table 53-1 describes the database schema for pattern information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_PATTERN.
Table 53-1 Pattern schema
Database Field Name Comment Data Type
PATTERN_IDX* Primary Key. char(32), not null
CLIENT_MONIKER The moniker for this content. varchar(40), not null
188 Pattern data table
Pattern schema
Table 53-1 Pattern schema (continued)
Database Field Name Comment Data Type
PATTERN_TYPE Virus definition = VIRUS_DEFS. nvarchar(128), varchar(128), not null
Possible values are as follows:
DECABI
DEUCE_SIG
ERASER_ENGINE
PTS_CONTENT
PTS_ENGINE
SYKNAPPS_CAL
SYKNAPPS_ENGINE
SYKNAPPS_WHITELIST
SEQUENCE The sequence number that is int, not null
associated with this definition.
PATTERNDATE The date when this content was datetime, not null
released.
REVISION The revision number for this content. int, not null
VERSION The version number for this content. varchar(255), not null
INSERTDATETIME The time when this pattern datetime, not null
information was entered into the
database.
USN A USN-based serial number; this ID bigint, not null
is not unique.
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = Not deleted
1 = Deleted
Chapter 54
Reports data table (not
used)
This chapter includes the following topics:
■ Reports schema
Reports schema
The Reports data table is not used.
Table 54-1 describes the database schema for report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_REPORTS.
Table 54-1 Reports schema (not used)
Database Field Name Comment Data Type
ID* The GUID of the report object. char(32), not null
TYPE The type of report. varchar(256), not null
REPORT_TIME The report sample time. bigint, not null
SITE_ID The GUID of the site from which the char(32), not null
report was generated.
190 Reports data table (not used)
Reports schema
Table 54-1 Reports schema (not used) (continued)
Database Field Name Comment Data Type
DOMAIN_ID The GUID of the domain to which the char(32), null
report belongs.
The reports for system administrator
do not have DOMAIN_ID.
CHECKSUM The checksum of the XML content. char(32), not null
CONTENT The XML content of the schema image, not null
object.
USN The update serial number; used by bigint, not null
replication.
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve merge
conflicts.
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
1 = Deleted
0 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 varchar(260), null
RESERVED_BINARY varbinary(2000), null
Chapter 55
Scan Report data table
This chapter includes the following topics:
■ Scan Report schema
Scan Report schema
Table 55-1 describes the database schema for scan report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SCANREPORT.
Table 55-1 Scan Report schema
Database Field Name Comment Data Type
SCANFILTER_IDX* Primary Key. char(32), not null
USER_ID The administrator GUID. char(32), not null
FILTERNAME The user-specified name for this saved filter. nvarchar(255), varchar(255),
not null
STARTTIMEFROM The start date. datetime, not null
STARTTIMETO The end date. datetime, not null
192 Scan Report data table
Scan Report schema
Table 55-1 Scan Report schema (continued)
Database Field Name Comment Data Type
RELATIVEDATETYPE Possible values are as follows: int, not null
0 = past week
1 = past month
2 = past three months
3 = past year
4 = past 24 hours
5 = current month
DURATION The length of the scan. int, not null
FILESCANNED The number of files scanned. bigint, not null
THREATS The number of risks the scan found. int, not null
FILESINFECTED The number of files the scan found. bigint, not null
SCANSTARTMESSAGE The scan description. nvarchar(255), varchar(255),
not null
STATUS The scan status as a hard-coded English key. varchar(32), not null
Possible values are as follows: Completed, Cancelled,
Started, % means no filter (all)
SERVERGROUPLIST A comma-separated list of server groups by which to nvarchar(255), varchar(255),
filter. These names can contain wildcard characters. not null
CLIENTGROUPLIST A comma-separated list of client groups by which to nvarchar(255), varchar(255),
filter. These names can contain wildcard characters. not null
PARENTSERVERLIST A comma-separated list of parent servers by which to nvarchar(255), varchar(255),
filter. These names can contain wildcard characters. not null
COMPUTERLIST A comma-separated list of computers by which to filter. nvarchar(512), varchar(512),
These names can contain wildcard characters. not null
IPADDRESSLIST A comma-separated list of IP addresses by which to nvarchar(255), varchar(255),
filter. These names can contain wildcard characters. not null
USERLIST A comma-separated list of users by which to filter. nvarchar(255), varchar(255),
These names can contain wildcard characters. not null
LASTCOLUMN Not used. varchar(32), not null
Scan Report data table 193
Scan Report schema
Table 55-1 Scan Report schema (continued)
Database Field Name Comment Data Type
SORTORDER Possible values are as follows: varchar(32), not null
'I.Computer'
'P.Parentserver'
'G.Clientgroup'
'C.Clientuser'
'S.Servergroup'
'SC.Startdatetime'
'SC.Duration'
'SC.Totalfiles' (total files scanned)
'SC.Threats'
'SC.Infected' (total files infected)
SORTDIR Sort direction. varchar(5), not null
Possible values are as follows:
desc = Descending
asc = Ascending
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
REPORT_IDX Not used. int, not null
REPORTINPUTS Special parameters if a report needs them. nvarchar(255), varchar(255),
not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = Not Deleted
1 = Deleted
194 Scan Report data table
Scan Report schema
Chapter 56
Scans data table
This chapter includes the following topics:
■ Scans schema
Scans schema
Table 56-1 describes the database schema for scans information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SCANS.
Table 56-1 Scans schema
Database Field Name Comment Data Type
SCAN_IDX* Primary Key. char(32), not null
SCAN_ID The scan ID provided by the agent. bigint, not null
STARTDATETIME The start time for the scan. datetime, not null
STOPDATETIME The stop time for the scan. datetime, not null
STATUS The scan status as a hard-coded English varchar(20), not null
key. Possible values are as follows:
completed = Completed
canceled = Canceled
started = Started
196 Scans data table
Scans schema
Table 56-1 Scans schema (continued)
Database Field Name Comment Data Type
DURATION The length of the scan in seconds. int, not null
COMPUTER_IDX Foreign key to char(32), not null
SEM_COMPUTER.COMPUTER_ID.
CLIENTUSER1 The user who was logged in when the scan nvarchar(64), varchar(64), not null
started.
CLIENTUSER2 The user who was logged in when the scan nvarchar(64), varchar(64), not null
ended.
SERVERGROUP_IDX Pointer to table IDENTITY_MAP (domain char(32), not null
GUID).
PARENTSERVER_IDX Pointer to table IDENTITY_MAP (server char(32), not null
GUID).
CLIENTGROUP_IDX Pointer to table IDENTITY_MAP (group char(32), not null
GUID).
MESSAGE1 The scan message when scan started. nvarchar(255), varchar(255)not null
MESSAGE2 The scan message when the scan ended. nvarchar(255), varchar(255), not null
THREATS The number of threats that the scan bigint, not null
found.
INFECTED The number of files that the scan found bigint, not null
infected.
TOTALFILES The number of files scanned. bigint, not null
OMITTED The number of files omitted. bigint, not null
USN A USN-based serial number; this ID is not bigint, not null
unique.
TIME_STAMP The time when this database record was bigint, not null
entered or modified in the database, in
milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = Not deleted
1 = Deleted
Scans data table 197
Scans schema
Table 56-1 Scans schema (continued)
Database Field Name Comment Data Type
SCAN_TYPE The type of scan. varchar(64), not null
Possible values are as follows:
ScanNow_Quick = Active Scan
ScanNow_Full = Full Scan
ScanNow_Custom = Admin-defined Scan
COMMAND_ID Pointer to table SEM_JOB; command ID varchar(32), null
that started this scan (if any).
198 Scans data table
Scans schema
Chapter 57
SE Global data table
This chapter includes the following topics:
■ SE Global schema
SE Global schema
Table 57-1 describes the database schema for the system sequence number.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
No primary key is specified for this table.
Table 57-1 SE Global schema
Database Field Name Comment Data Type
SEQ_NUM The latest USN on the site. bigint, not null
200 SE Global data table
SE Global schema
Chapter 58
SCF Inventory data table
(not used)
This chapter includes the following topics:
■ SCF Inventory schema
SCF Inventory schema
The SCF Inventory data table is not used.
Table 58-1 describes the database schema for SCF inventory information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SCFINVENTORY.
Table 58-1 SCF Inventory schema (not used)
Database Field Name Comment Data Type
AGENT_ID* Pointer to table SEM_AGENT. char(32), not null
IPSSIGDATE The date of the IPS signature. datetime, null
IPSSIGREV The revision of the IPS signature. int, null
SCFVERSION The firewall version. varchar(255), not null
SCFPOLICYFILE nvarchar(510), not null
202 SCF Inventory data table (not used)
SCF Inventory schema
Table 58-1 SCF Inventory schema (not used) (continued)
Database Field Name Comment Data Type
USN A USN-based serial number; this ID bigint, not null
is not unique.
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = Not deleted
1 = Deleted
Chapter 59
SEM Agent data table
This chapter includes the following topics:
■ SEM Agent schema
SEM Agent schema
Table 59-1 describes the database schema for agent information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_AGENT.
Table 59-1 SEM Agent schema
Database Field Name Comment Data Type
AGENT_ID* The GUID of the agent. char(32), not null
AGENT_TYPE The type of agent installed. varchar(64), null
Possible values are as follows:
105 = Symantec Endpoint Protection
151 = Symantec Network Access Control
204 SEM Agent data table
SEM Agent schema
Table 59-1 SEM Agent schema (continued)
Database Field Name Comment Data Type
R_OS_TYPE int, null
SEM Agent data table 205
SEM Agent schema
Table 59-1 SEM Agent schema (continued)
Database Field Name Comment Data Type
The Operating System type on the client computer.
Possible values are as follows:
50724882=Windows Server 2008
17170434 = Windows Vista Ultimate Edition
17170444 = Windows Vista Starter Edition
17170435 = Windows Vista Home Basic Edition
17170436 = Windows Vista Home Premium Edition
17170437 = Windows Vista Enterprise Edition
17170439 = Windows Vista Business Edition
50659858 = Windows Server 2003 Family Datacenter
Edition
50659874 = Windows Server 2003 Family Enterprise
Edition
50659890 = Windows Server 2003 Family Web Edition
50659842 = Windows Server 2003 Family Standard Edition
17105170 = Windows XP Home Edition
17105186 = Windows XP Home Embedded
17105154 = Windows XP Professional
50659346 = Windows 2000 Datacenter Server
50659362 = Windows 2000 Advanced Server
50659330 = Windows 2000 Server
17104898 = Windows 2000 Professional
50593810 = Windows NT Server 4.0, Enterprise Edition
50593794 = Windows NT Server 4.0
17039362 = Windows NT WorkStation 4.0
285185 = Windows Millennium
264961 = Windows 98 SE
264705 = Windows 98
262401 = Windows 95 OSR2
262145 = Windows 95
206 SEM Agent data table
SEM Agent schema
Table 59-1 SEM Agent schema (continued)
Database Field Name Comment Data Type
0 = OS Type Unspecified
COMPUTER_ID The GUID of the registered computer. char(32), null
DOMAIN_ID The GUID of the domain. char(32), null
GROUP_ID The current group GUID of the agent. char(32), null
AGENT_VERSION The version of the agent software. nvarchar(64), varchar(64),
null
PROFILE_VERSION The current profile version of the agent. varchar(64), null
PROFILE_SERIAL_NO The current profile serial number of the agent. varchar(64), null
PROFILE_CHECKSUM The current profile checksum of the agent. char(32), null
IDS_VERSION The current IDS version of the agent. varchar(64), null
IDS_SERIAL_NO The current IDS serial number of agent. varchar(64), null
IDS_CHECKSUM The current IDS checksum of the agent. char(32), null
HI_STATUS The Host integrity status. int, null
Possible values are as follows:
0 = Fail
1 = Success
2 = Pending
3 = Disabled
4 = Ignore
HI_REASONCODE The host integrity reason code. int, null
Possible values are as follows:
0 = Pass
101 = Antivirus version is out-of-date
102 = Antivirus is not running
103 = Script failed
104 = Check is incomplete
105 = Check is disabled
127 = Location changed
SEM Agent data table 207
SEM Agent schema
Table 59-1 SEM Agent schema (continued)
Database Field Name Comment Data Type
HI_REASONDESC The host integrity description. varchar(64), null
CREATION_TIME The create time of the agent. bigint, null
STATUS The online status of the agent. tinyint, null
Possible values are as follows:
0 = offline
1 = online
LAST_UPDATE_TIME The last online time of the agent. bigint, null
LAST_SERVER_ID The last connected server GUID. char(32), null
LAST_SITE_ID The last connected site GUID. char(32), null
ATTRIBUTE_EXTENSION Not used. nvarchar(2000),
varchar(2000), null
FULL_NAME The employee's full name. nvarchar(256),
varchar(256), null
EMAIL The employee's email address. nvarchar(129),
varchar(129), null
JOB_TITLE The employee's job title. nvarchar(128),
varchar(128), null
DEPARTMENT The employee's department. nvarchar(128),
varchar(128), null
EMPLOYEE_NUMBER The employee's number. varchar(32), null
EMPLOYMENT_STATUS The employee's status. varchar(16), null
OFFICE_PHONE The employee's office number. varchar(32), null
MOBILE_PHONE The employee's mobile number. varchar(32), null
HOME_PHONE The employee's home phone number. varchar(32), null
USN The update serial number; used by replication. bigint, not null
TIME_STAMP The time that the database record was modified; used to bigint, not null
resolve merge conflicts.
208 SEM Agent data table
SEM Agent schema
Table 59-1 SEM Agent schema (continued)
Database Field Name Comment Data Type
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
1 = Deleted
0 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260),
varchar(260), null
PATTERN_IDX Pointer to table 'pattern'. char(32), not null
AP_ONOFF Auto-Protect status. tinyint, not null
Possible values are as follows:
1 = On
2 = Not installed
0 = Off
127 = Not reporting
INFECTED Is this computer infected? tinyint, not null
Possible values are as follows:
0 = Not infected
1 = Infected
SEM Agent data table 209
SEM Agent schema
Table 59-1 SEM Agent schema (continued)
Database Field Name Comment Data Type
WORSTINFECTION_IDX Worst detection. int, not null
Possible values are as follows:
0 = (Severity 0) Viral
1 = (Severity 1) Non-Viral malicious
2 = (Severity 2) Malicious
3 = (Severity 3) Antivirus - Heuristic
5 = (Severity 5) Hack tool
6 = (Severity 6) Spyware
7 = (Severity 7) Trackware
8 = (Severity 8) Dialer
9 = (Severity 9) Remote access
10 = (Severity 10) Adware
11 = (Severity 11) Jokeware
12 = (Severity 12) Client compliancy
13 = (Severity 13) Generic load point
14 = (Severity 14) Proactive Threat Scan - Heuristic
15 = (Severity 15) Cookie
9999 = No detections
LAST_SCAN_TIME The last scan time for this agent (in GMT). bigint, not null
LAST_VIRUS_TIME The last time that a virus was detected on the client bigint, not null
computer (in GMT).
CONTENT_UPDATE Accepts content updates. tinyint, not null
Possible values are as follows:
1 = yes
0 = no
210 SEM Agent data table
SEM Agent schema
Table 59-1 SEM Agent schema (continued)
Database Field Name Comment Data Type
AVENGINE_ONOFF RTVScan status. tinyint, not null
Possible values are as follows:
1 = On
2 = Not installed
0 = Off
127 = Not reporting
TAMPER_ONOFF Tamper Protection status. tinyint, not null
Possible values are as follows:
1 = On
2 = Not installed
0 = Off
127 = Not reporting status
MAJOR_VERSION The Symantec Endpoint Protection version: 11. int, not null
MINOR_VERSION The minor version. int, not null
REBOOT_REQUIRED Restart Required. tinyint, not null
Possible values are as follows:
0 = No
1 = Yes
REBOOT_REASON Format is <component> = <reason ID>;<component> = varchar(128), not null
<reason ID>...
Components are as follows:
AVMAN = Antivirus
LUMAN = LiveUpdate
FW = Network Threat Protection
GUP = Group Update Provider
Reasons are as follows:
1 = Risk remediation to complete
2 = Product patch to apply
3 = Content download to apply
SEM Agent data table 211
SEM Agent schema
Table 59-1 SEM Agent schema (continued)
Database Field Name Comment Data Type
LICENSE_STATUS For future use. int, not null
LICENSE_EXPIRY For future use. bigint, not null
TIMEZONE The time zone offset of the client computer. int, not null
FIREWALL_ONOFF The firewall status. tinyint, not null
Possible values are as follows:
1 = On
2 = Not installed
0 = Off
127 = Not reporting
FREE_MEM The free memory available. bigint, null
FREE_DISK The free disk space available. bigint, null
LAST_DOWNLOAD_TIME The last download time. bigint, not null
212 SEM Agent data table
SEM Agent schema
Chapter 60
SEM Application data table
This chapter includes the following topics:
■ SEM Application schema
SEM Application schema
Table 60-1 describes the database schema for application information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_APPLICATION.
Table 60-1 SEM Application schema
Database Field Name Comment Data Type
DOMAIN_ID* The GUID of the domain. char(32), not null
APP_HASH* The checksum of the learned char(32), not null
application, including the name, path,
file checksum, file size, and so on.
APPLICATION_NAME The name of the learned application. nvarchar(260), varchar(260), not null
APPLICATION_PATH The path of the learned application. nvarchar(260), varchar(260), null
APP_DESCRIPTION The description of the learned nvarchar(1024), varchar(1024), null
application.
CHECKSUM The file checksum of the application char(32), not null
binary.
214 SEM Application data table
SEM Application schema
Table 60-1 SEM Application schema (continued)
Database Field Name Comment Data Type
FILE_SIZE The file size of the application binary. bigint, null
VERSION The file version of the application varchar(256), null
binary.
LAST_MODIFY_TIME The last modification time of the bigint, null
application binary.
USN The update serial number; used by bigint, not null
replication.
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
1 = Deleted
0 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260), varchar(260), null
RESERVED_BINARY varbinary(2000), null
Chapter 61
SEM Client data table
This chapter includes the following topics:
■ SEM Client schema
SEM Client schema
Table 61-1 describes the database schema for the client information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_CLIENT.
Table 61-1 SEM Client schema
Database Field Name Comment Data Type
CLIENT_ID* The GUID of the client. Primary Key. char(32), not null
DOMAIN_ID The GUID of the domain. char(32), null
GROUP_ID The GUID of the group. char(32), null
GROUP_IS_OU If the client is from Active Directory. tinyint, null
OU_GUID The GUID of the Organizational Unit char(32), null
if the client is from the Active
Directory.
POLICY_MODE Enum {USER_MODE, int, null
COMPUTER_MODE}
216 SEM Client data table
SEM Client schema
Table 61-1 SEM Client schema (continued)
Database Field Name Comment Data Type
COMPUTER_ID The GUID of the registered computer. char(32), null
HARDWARE_KEY The hash of the computer hardware char(32), null
information.
COMPUTER_NAME The computer name. nvarchar(64), varchar(64), null
COMPUTER_DOMAIN_NAME The computer description. nvarchar(256), varchar(256), null
DESCRIPTION The domain name of the computer. nvarchar(256), varchar(256), null
USER_NAME The user logon name. nvarchar(64), varchar(64), null
FULL_NAME The full name of the user. nvarchar(64), varchar(64), null
USER_DOMAIN_NAME The user logon domain name. nvarchar(256), varchar(256), null
HASH The hash of the following: char(32), not null
POLICY_MODE
COMPUTER_NAME
COMPUTER_DOMAIN_NAME
USER_NAME
USER_DOMAIN_NAME
PIN_MARK A flag to mark whether this client tinyint, null
should be synchronized with Active
Directory.
EXTRA_FEATURE int, null
CREATOR tinyint, null
CREATION_TIME The create time of the client. bigint, null
USN The update serial number; used by bigint, not null
replication.
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.
SEM Client data table 217
SEM Client schema
Table 61-1 SEM Client schema (continued)
Database Field Name Comment Data Type
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
1 = Deleted
0 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260), varchar(260), null
RESERVED_BINARY varbinary(2000), null
218 SEM Client data table
SEM Client schema
Chapter 62
SEM Compliance Criteria
data table
This chapter includes the following topics:
■ SEM Compliance Criteria schema
SEM Compliance Criteria schema
Table 62-1 describes the database schema for compliance criteria information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_COMPLIANCE_CRITERIA.
Table 62-1 SEM Compliance Criteria schema
Database Field Name Comment Data Type
CRITERIA_IDX* Primary Key. char(32), not null
AGENT_SECURITY_LOG_IDX* Foreign key to char(32), not null
V_AGENT_SECURITY.AGENT_SECURITY_LOG_IDX.
ACTION ACTION is a hard-coded English key with one of two possible varchar(64), not null
values: "check" or "remediation".
RULE_NAME The administrator-provided rule name from the policy. nvarchar(256),
varchar(256), not
null
220 SEM Compliance Criteria data table
SEM Compliance Criteria schema
Table 62-1 SEM Compliance Criteria schema (continued)
Database Field Name Comment Data Type
RULE_TYPE RULE_TYPE is a hard-coded English key with one of the varchar(64), not null
following possible values:
antivirus
antispyware
patch
service pack
firewall
custom
unknown - fallback when processing log at the server and
action ends up null or blank
SEM Compliance Criteria data table 221
SEM Compliance Criteria schema
Table 62-1 SEM Compliance Criteria schema (continued)
Database Field Name Comment Data Type
CRITERIA varchar(256), not
null
222 SEM Compliance Criteria data table
SEM Compliance Criteria schema
Table 62-1 SEM Compliance Criteria schema (continued)
Database Field Name Comment Data Type
CRITERIA is a hard-coded English key with one of the
following possible values:
as_is_installed
as_is_running
as_signature_ok
av_is_installed
av_is_running
av_signature_ok
file_age_ok
file_date_ok
file_size_ok
file_version_ok
file_download
file_exists
file_checksum_ok
file_execute
fw_is_installed
fw_is_running
patch_is_installed
reg_value_incr
reg_key_exists
reg_value_ok
reg_value_exists
reg_value_set
timestamp_ok
msg_dlg_ok
os_ok
os_lang_ok
process_is_running – means either user application or
service
SEM Compliance Criteria data table 223
SEM Compliance Criteria schema
Table 62-1 SEM Compliance Criteria schema (continued)
Database Field Name Comment Data Type
file_delete
service_pack_ok
hi_setup
remediation – to provide an overall status of remediation
unknown – fallback at the server if the criteria type is null
or blank
TARGET The target of the criteria. For example, it can be the antivirus nvarchar(256),
product name, the firewall product name, the file name, the varchar(256), not
registry key, the registry value. It can also be the patch null
version, the OS version, the process name, or the service
name.
RESULT RESULT takes one of the following possible values: varchar(64), not null
pass
fail
ignore
error
postponed – just for remediation criteria
unknown – fallback at the server if the criteria or rule ends
up without a final status
224 SEM Compliance Criteria data table
SEM Compliance Criteria schema
Table 62-1 SEM Compliance Criteria schema (continued)
Database Field Name Comment Data Type
ERROR ERROR takes one of the following possible values: varchar(128), not
null
unknown = unknown
product_unknown = product unknown
file_notfound = file not found
filename_invalid = invalid file name
parameter_invalid = invalid condition parameter
parameter_undefined = condition parameter was not
specified in the policy
bad_url = URL format is invalid
filedownload_op_err = URL not accessible or failed to create
destination file
time_out = action timed out
connection_lost = connection was lost
access_violation = access violation on file
access_denied = access denied
remediation_abort = user aborted remediation
remediation_postpone = user postponed remediation
createdir_failed = directory creation failed
system_err = system error
runas_noprivilege = a required privilege is not held by the
client
internal_err = internal error
os_unknown = failed to detect operating system type
SEM Compliance Criteria data table 225
SEM Compliance Criteria schema
Table 62-1 SEM Compliance Criteria schema (continued)
Database Field Name Comment Data Type
DESCRIPTION Additional compliance check details. Either exception text nvarchar(256),
or one of the following values: varchar(256), not
null
Checksum_blank = fingerprint value is empty
Failed_to_get_modification_date = failed to get modification
date
NAN = not a number
Cannot_parse_URL = cannot parse URL
URL_not_accessible_or_failed_to_create_destination_file
= URL not accessible or failed to create destination file
Download_exceeded_limit = download exceeded limit
Destination = destination file access violation
By_User = action initiated by user
Access_denied_by_server = access denied by server
Download_file = download file not found
Process_time_out = process timed out
Failed_to_detect_OS_type = failed to detect OS type
Application_name_is_empty = application name is empty
Probably_software_is_not_installed = probably the software
is not installed
Signature_age_in_seconds_failed = cannot compute
signature age
Failed_to_parse_URL = failed to parse URL
Missing_or_no_version_info = missing or no version
information
After_script_file_running = after script file run
OS_ignore = operating system check was ignored
Save_failed = save failed
No_previous_time = no previous time
OK_or_YES = user response was OK or Yes
Cancel_or_NO = user response was Cancel or No
Fail_to_get_current_OS_language_version = cannot retrieve
current operating system language
226 SEM Compliance Criteria data table
SEM Compliance Criteria schema
Table 62-1 SEM Compliance Criteria schema (continued)
Database Field Name Comment Data Type
USN The update serial number; used by replication. bigint, not null
TIME_STAMP The time that the database record was modified; used to bigint, not null
resolve merge conflicts.
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
1 = Deleted
0 = Not Deleted
Chapter 63
SEM Computer data table
This chapter includes the following topics:
■ SEM Computer schema
SEM Computer schema
Table 63-1 describes the database schema for computer information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_COMPUTER
Table 63-1 SEM Computer schema
Database Field Name Comment Data Type
COMPUTER_ID* The GUID of the computer. char(32), not null
The computer can be added from both
the console and the agent.
Primary Key.
DOMAIN_ID The GUID of the domain. char(32), null
HARDWARE_KEY The hash of the computer hardware char(32), null
information.
COMPUTER_NAME The computer name. nvarchar(64), varchar(64), null
COMPUTER_DOMAIN_NAME The computer description. nvarchar(256), varchar(256), null
228 SEM Computer data table
SEM Computer schema
Table 63-1 SEM Computer schema (continued)
Database Field Name Comment Data Type
COMPUTER_DESCRIPTION The domain name of the computer. nvarchar(256), varchar(256), null
PROCESSOR_TYPE The processor type. nvarchar(64), varchar(64), null
PROCESSOR_CLOCK The processor clock. bigint, null
PROCESSOR_NUM The number of processors. int, null
MEMORY The physical memory in KB. bigint, null
BIOS_VERSION The BIOS version. varchar(128), null
TPM_DEVICE The TPM device ID. int, null
OPERATION_SYSTEM The operation system name. nvarchar(64), varchar(64), null
SERVICE_PACK The service pack. nvarchar(64), varchar(64), null
CURRENT_LOGIN_USER The user who is logged in. nvarchar(64), varchar(64), null
CURRENT_LOGIN_DOMAIN The Windows domain. nvarchar(256), varchar(256), null
DNS_SERVER1 bigint, null
DNS_SERVER2 bigint, null
WINS_SERVER1 bigint, null
WINS_SERVER2 bigint, null
DHCP_SERVER bigint, null
MAC_ADDR1 varchar(17), null
IP_ADDR1 bigint, null
GATEWAY1 bigint, null
SUBNET_MASK1 bigint, null
MAC_ADDR2 varchar(17), null
IP_ADDR2 bigint, null
GATEWAY2 bigint, null
SUBNET_MASK2 bigint, null
MAC_ADDR3 varchar(17), null
SEM Computer data table 229
SEM Computer schema
Table 63-1 SEM Computer schema (continued)
Database Field Name Comment Data Type
IP_ADDR3 bigint, null
GATEWAY3 bigint, null
SUBNET_MASK3 bigint, null
MAC_ADDR4 varchar(17), null
IP_ADDR4 bigint, null
GATEWAY4 bigint, null
SUBNET_MASK4 bigint, null
USN The update serial number; used by bigint, not null
replication.
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
1 = Deleted
0 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260), varchar(260), null
RESERVED_BINARY varbinary(2000), null
DISK_TOTAL The total disk space. bigint, null
DISK_DRIVE The drive letter that is referred to by varchar(3), null
DISK_TOTAL.
230 SEM Computer data table
SEM Computer schema
Table 63-1 SEM Computer schema (continued)
Database Field Name Comment Data Type
OS_LANG The operating system language ID, int, null
for example, English = 0x09.
Chapter 64
SEM Content data table
This chapter includes the following topics:
■ SEM Content schema
SEM Content schema
Table 64-1 describes the database schema for content information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_CONTENT.
Table 64-1 SEM Content schema
Database Field Name Comment Data Type
AGENT_ID* The GUID of the agent. char(32), not null
PATTERN_IDX* Pointer to pattern table. char(32), not null
USN The update serial number; used by bigint, not null
replication.
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.
232 SEM Content data table
SEM Content schema
Table 64-1 SEM Content schema (continued)
Database Field Name Comment Data Type
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
1 = Deleted
0 = Not Deleted
Chapter 65
SEM Job data table
This chapter includes the following topics:
■ SEM Job schema
SEM Job schema
Table 65-1 describes the database schema for job information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_JOB.
Table 65-1 SEM Job schema
Database Field Name Comment Data Type
COMMAND_ID* The GUID of the command object. This GUID char(32), not null
corresponds to the ID in the Basic Metadata table.
USN The update serial number; used by replication. bigint, not null
234 SEM Job data table
SEM Job schema
Table 65-1 SEM Job schema (continued)
Database Field Name Comment Data Type
COMMAND_NAME A hard-coded English string that indicates which varchar(64), not null
command was launched. This string is the same string
that is placed in the XML for pre-defined name.
Possible values are as follows:
Update_Now = Update Content
ScanNow_Full = Full Scan
ScanNow_Quick = Active Scan
ScanNow_Custom = Custom Scan
Update_ScanNow_Full = Update Content and Scan Full
Update_ScanNow_Quick = Update Content and Scan
Quick
Update_ScanNow_Custom = Update Content and Scan
Custom
CancelScan = Cancel Scan
Reboot = Restart
ApOn = Turn Auto-Protect On
ApOff = Turn Auto-Protect Off
FwOn = Turn Firewall On
FwOff = Turn Firewall Off
DeleteQuarantine = Delete from Quarantine
COMMAND_DESC A detailed description of the command. nvarchar(350),
varchar(350), null
SOURCE_SITE_ID The GUID of the site from which the command was char(32), not null
generated.
SOURCE_ADMIN_ID The GUID of the administrator who issued the char(32), not null
command.
CREATE_TIME The time that the command was issued at the console bigint, not null
by the administrator.
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
SEM Job data table 235
SEM Job schema
Table 65-1 SEM Job schema (continued)
Database Field Name Comment Data Type
DELETED Deleted row: tinyint, not null
1 = Deleted
0 = Not Deleted
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 varchar(260), null
RESERVED_BINARY varbinary(1000), null
236 SEM Job data table
SEM Job schema
Chapter 66
Serial Numbers data table
This chapter includes the following topics:
■ Serial Numbers schema
Serial Numbers schema
Table 66-1 describes the database schema for serial number information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
No primary key is specified for this table.
Table 66-1 Serial Numbers schema
Database Field Name Comment Data Type
GROUP_ID The GUID of a group. char(32), not null
PROFILE_SERIAL_NO The profile serial number of the varchar(64), not null
group.
238 Serial Numbers data table
Serial Numbers schema
Chapter 67
Server Admin Logs data
tables
This chapter includes the following topics:
■ Server Admin Logs 1 and 2 schema
Server Admin Logs 1 and 2 schema
Table 67-1 describes the database schema for the Server Administration logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
No primary key is specified for this table.
Table 67-1 Server Admin Logs 1 and 2 schema
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
240 Server Admin Logs data tables
Server Admin Logs 1 and 2 schema
Table 67-1 Server Admin Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
SEVERITY Enum (SEVERE, WARNING, INFO, CONFIG, FINE, int, not null
FINER, FINEST).
ADMIN_NAME The Administrator’s name. nvarchar(250), varchar(250),
not null
Server Admin Logs data tables 241
Server Admin Logs 1 and 2 schema
Table 67-1 Server Admin Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
EVENT_ID int, not null
242 Server Admin Logs data tables
Server Admin Logs 1 and 2 schema
Table 67-1 Server Admin Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
The unique ID of the admin event.
Possible values are as follows:
0x1001 = Login succeeded
0x1002 = Login failed
0x1003 = Log out
0x1004 = Account locked
0x1005 = Account unlocked
0x1006 = Account disabled
0x1007 = Account enabled
0x1008 = Administrator created
0x1009 = Administrator deleted
0x100A = Administrator renamed
0x100B = Password changed
0x100C = Administrator properties are changed
0x100D = Domain is created
0x100E = Domain is deleted
0x100F = Domain properties are changed
0x1020 = Domain is disabled
0x1021 = Domain is enabled
0x1022 = Domain is renamed
0x2001 = Group is created
0x2002 = Group is deleted
0x2003 = Group is renamed
0x2004 = Group is moved
0x2005 = Group properties are changed
0x2006 = User is created
0x2007 = User is deleted
0x2008 = User is moved
0x2009 = User is copied
0x200A = User policy mode is switched
Server Admin Logs data tables 243
Server Admin Logs 1 and 2 schema
Table 67-1 Server Admin Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
0x200B = User properties are changed
0x200C = Computer is created
0x200D = Computer is deleted
0x200E = Computer is moved
0x200F = Computer is copied
0x2010 = Computer policy mode is switched
0x2011 = Computer properties are changed
0x2012 = Organizational Unit is imported
0x2013 = Domain user is imported
0x2014 = LDAP user is imported
0x3001 = Package is created
0x3002 = Package is deleted
0x3003 = Package is exported
0x3004 = Package is moved to recycle bin
0x3005 = Package is now current
0x3006 = Package is added to other domain
0x3007 = Package properties are changed
0x3008 = Package deployment created
0x3009 = Package deployment deleted
0x300A = Package deployment properties changed
0x300B = Package updated
0x4001 = Replication partner is registered
0x4002 = Replication partner is deleted
0x4003 = Remote site is deleted
0x4004 = Site properties are changed
0x4005 = Server properties are changed
0x4006 = Database properties are changed
0x4007 = Partner properties are change
0x4008 = Site license is changed
0x4009 = Enforcer license changed
244 Server Admin Logs data tables
Server Admin Logs 1 and 2 schema
Table 67-1 Server Admin Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
0x4010 = Replicate now
0x4011 = Back up now
0x4012 = External logging properties are changed
0x4013 = Site backup settings changed
0x4014 = Server deleted
0x4015 = Server certificate changed
0x4016 = Enforcer group properties changed
EVENT_DESC A description of the event. Usually, the first line of the nvarchar(256), varchar(256),
description is treated as “summary". null
MSG_ID The event description ID. Use this ID to load the int, null
localized message. Only used when an exception is
related to this event.
ERROR_CODE ErrorCode can uniquely identify the error in source int, null
code. Used only when an exception is related to this
event.
STACK_TRACE The stack trace of the exception. Used only when an nvarchar(2000),
exception is related to this event. varchar(2000), null
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(520), null
RESERVED_BINARY varbinary(2000), null
Chapter 68
Server Client Logs data
tables
This chapter includes the following topics:
■ Server Client Logs 1 and 2 schema
Server Client Logs 1 and 2 schema
Table 68-1 describes the database schema for the Server Client logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_SERVER_CLIENT_LOG_1_LOG_IDX or
I_SERVER_CLIENT_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.
Table 68-1 Server Client Logs 1 and 2 schema
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
246 Server Client Logs data tables
Server Client Logs 1 and 2 schema
Table 68-1 Server Client Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered bigint, not null
or modified in the database, in milliseconds since
1970.
EVENT_ID The unique ID of the client activity event. int, not null
Possible values are as follows:
1 = Registration succeeded
2 = Registration failed
3 = Client reconnected
4 = Client disconnected
5 = Downloaded policy
6 = Downloaded Intrusion Prevention policy
7 = Downloaded sylink.xml
8 = Downloaded auto-upgrade file
9 = Server received log
10 = Log processing failed
11 = Server received learned application
12 = Server received client information
13 = Client information processing failed
14 = Hardware identity change
15 = Downloaded File Fingerprint list
20 = Downloaded content package
22 = Downloaded command
AGENT_ID The GUID of the agent. char(32), not null
HOST_NAME The computer name of the client. nvarchar(256), varchar(256),
null
USER_NAME The logon user name of the client. nvarchar(256), varchar(256),
null
Server Client Logs data tables 247
Server Client Logs 1 and 2 schema
Table 68-1 Server Client Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
DOMAIN_NAME The domain name of the client. nvarchar(256), varchar(256),
null
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260), varchar(260),
null
RESERVED_BINARY varbinary(2000), null
LOG_IDX* The log index unique ID. char(32), null
248 Server Client Logs data tables
Server Client Logs 1 and 2 schema
Chapter 69
Server Enforcer Logs data
tables
This chapter includes the following topics:
■ Server Enforcer Logs 1 and 2 schema
Server Enforcer Logs 1 and 2 schema
Table 69-1 describes the database schema for the Server Enforcer logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_SERVER_ENFORCER_LOG_1_LOG_IDX or
I_SERVER_ENFORCER_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.
Table 69-1 Server Enforcer Logs 1 and 2 schema
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
250 Server Enforcer Logs data tables
Server Enforcer Logs 1 and 2 schema
Table 69-1 Server Enforcer Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
Server Enforcer Logs data tables 251
Server Enforcer Logs 1 and 2 schema
Table 69-1 Server Enforcer Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
EVENT_ID int, not null
252 Server Enforcer Logs data tables
Server Enforcer Logs 1 and 2 schema
Table 69-1 Server Enforcer Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
The unique ID of the Enforcer activity.
Possible values are as follows:
0x101 = Connected to Symantec Endpoint Protection
Manager
0x102 = Lost connection to Symantec Endpoint
Protection Manager
0x103 = Applied policy that is downloaded from
Symantec Endpoint Protection Manager
0x104 = Failed to apply policy that is downloaded from
Symantec Endpoint Protection Manager
0x107 = Applied management server configuration
0x108 = Failed to apply management server
configuration
0x201 = Enforcer started
0x202 = Enforcer stopped
0x203 = Enforcer paused
0x204 = Enforcer resumed
0x205 = Enforcer disconnected from server
0x301 = Enforcer failover enabled
0x302 = Enforcer failover disabled
0x303 = Enforcer in standby mode
0x304 = Enforcer in primary mode
0x305 = Enforcer short
0x306 = Enforcer loop
0x401 = Forward engine pause
0x402 = Forward engine start
0x403 = DNS Enforcer enabled
0x404 = DNS Enforcer disabled
0x405 = DHCP Enforcer enabled
0x406 = DHCP Enforcer disabled
0x407 = Allow all enabled
Server Enforcer Logs data tables 253
Server Enforcer Logs 1 and 2 schema
Table 69-1 Server Enforcer Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
0x408 = Allow all disabled
0x501 = Seat number change
0x601 = Failed to create policy parser
0x602 = Failed to import policy that is downloaded
from Symantec Endpoint Protection Manager
0x603 = Failed to export policy that is downloaded
from Symantec Endpoint Protection Manager
0x701 = Incorrect customized attribute
ENFORCER_ID The GUID of the Enforcer. char(32), not null
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(520), null
RESERVED_BINARY varbinary(2000), null
LOG_IDX* char(32), null
254 Server Enforcer Logs data tables
Server Enforcer Logs 1 and 2 schema
Chapter 70
Server Policy Logs data
tables
This chapter includes the following topics:
■ Server Policy Logs 1 and 2 schema
Server Policy Logs 1 and 2 schema
Table 70-1 describes the database schema for the Server Policy logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
No primary key is specified for this table.
Table 70-1 Server Policy Logs 1 and 2 schema
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
DOMAIN_ID The GUID of the domain which was administered. char(32), null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
256 Server Policy Logs data tables
Server Policy Logs 1 and 2 schema
Table 70-1 Server Policy Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered bigint, not null
or modified in the database, in milliseconds since
1970.
EVENT_ID The unique ID of the policy event. int, not null
Possible values are as follows:
0 = Policy added
1 = Policy deleted
2 = Policy edited
3 = Add shared policy upon system install
4 = Add shared policy upon system upgrade
5 = Add shared policy upon domain creation
OBJECT_ID The GUID of the Agent Policy. char(32), not null
ADMIN_ID The GUID of the administrator who modified the char(32), not null
policy.
EVENT_DESC A description of the event. Usually, the first line nvarchar(512), null
of the description is treated as “summary".
EVENT_DATA Additional data in binary format. This field is varbinary(2000), null
optional.
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260), varchar(260),
null
RESERVED_BINARY varbinary(2000), null
Chapter 71
Server System Logs data
tables
This chapter includes the following topics:
■ Server System Logs 1 and 2 schema
Server System Logs 1 and 2 schema
Table 71-1 describes the database schema for the Server System logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
No primary key is specified for this table.
Table 71-1 Server System Logs 1 and 2 schema
Database Field Name Comment Data Type
USN A USN-based serial number; this ID is not unique. bigint, not null
DOMAIN_ID Not used, logged as a 0-length string. char(32), null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
258 Server System Logs data tables
Server System Logs 1 and 2 schema
Table 71-1 Server System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
SEVERITY Enum (SEVERE, WARNING, INFO, CONFIG, FINE, int, not null
FINER, FINEST):
>= 400 = Finer and above
>=500 = Fine and above
>=700 = Configuration and above
>=800 = Informational and above
>=900 = Warning and above
>=1000 = Severe and above
EVENT_ID The unique ID of the system event. int, not null
EVENT_DESC A description of the event; usually, the first line of nvarchar(2000),
description is treated as a “summary.” varchar(2000), null
MSG_ID The event description ID. Use this ID to load a localized int, null
message. Only used when an exception is related to
this event.
ERROR_CODE ErrorCode can unique identify the error in source code. int, null
Only used when an exception is related to this event.
STACK_TRACE Stack trace of exception. Only used when an exception nvarchar(2000),
is related to this event. varchar(2000), null
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260),
varchar(260), null
Server System Logs data tables 259
Server System Logs 1 and 2 schema
Table 71-1 Server System Logs 1 and 2 schema (continued)
Database Field Name Comment Data Type
RESERVED_BINARY varbinary(2000), null
260 Server System Logs data tables
Server System Logs 1 and 2 schema
Chapter 72
System Report data table
This chapter includes the following topics:
■ System Report schema
System Report schema
Table 72-1 describes the database schema for system report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SYSTEMREPORT.
Table 72-1 System Report schema
Database Field Name Comment Data Type
SYSTEMFILTER_IDX* Primary Key. char(32), not null
USER_ID The ID of the administrator who created this filter. Foreign char(32), not null
key to user_id column in the Admin User table.
FILTERNAME The filter name that the administrator provided during the nvarchar(255),
save filter operation. varchar(255), not null
STARTDATEFROM The time filter start date. datetime, not null
STARTDATETO The time filter end date. datetime, not null
262 System Report data table
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
RELATIVEDATETYPE Possible values are as follows: int, not null
0 = past week
1 = past month
2 = past three months
3 = past year
4 = past 24 hours
5 = current month
SYSTEM_TYPE Possible values are as follows: tinyint, null
1 = Administrative
2 = Client server activity
3 = Server activity
4 = Client activity
5 = Enforcer Activity
SEVERITY For Administrative, Client-Server, and Server Activity logs, int, null
possible values are as follows:
1000 = Error and above
900 = Warning and above
800 = Informational and above
-1 = No filter (all)
For Enforcer activity and Client activity, possible values are
as follows:
0 = Informational and above
1 = Warning and above
2 = Error and above
3 = Fatal
-1 = No filter (all)
System Report data table 263
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
EVENT_ID varchar(32), not null
264 System Report data table
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
Blank or % in this field means no filtering.
For the Administrative System log. For this log type, this
field stores the value on the left of the = sign, for example,
'ADMIN_ADMIN_TYPES'. It is a hard-coded English string
key. To the right of the = sign are the events that are queried
when the user selects the group.
ADMIN_ADMIN_TYPES = Administrator events.
Possible values are as follows:
4097 = Login succeeded
4098 = Login failed
4099 = Logout
4050 = Account locked
4101 = Account unlocked
4102 = Account disabled
4103 = Account enabled
4104 = Administrator created
4105 = Administrator deleted
4106 = Administrator renamed
4107 = Password changed
4108 = Administrator properties are changed
ADMIN_DOMAIN_TYPES = Domain events.
Possible values are as follows:
4109 = Domain is created
4110 = Domain is deleted
4111 = Domain properties are changed
4128 = Domain is disabled
4129 = Domain is enabled
4130 = Domain is renamed
ADMIN_GROUP_TYPES = Group events.
Possible values are as follows:
8193 = Group is created
System Report data table 265
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
8194 = Group is deleted
8195 = Group is renamed
8196 = Group is moved
8197 = Group properties are changed
ADMIN_USER_TYPES = User events.
Possible values are as follows:
8198 = User is created
8199 = User is deleted
8200 = User is moved
8201 = User is copied
8202 = User policy mode is switched
8203 = User properties are changed
ADMIN_COMPUTER_TYPES = Computer events.
Possible values are as follows:
8204 = Computer is created
8205 = Computer is deleted
8206 = Computer is moved
8207 = Computer is copied
8208 = Computer policy mode is switched
8209 = Computer properties are changed
ADMIN_IMPORT_TYPES = Import events.
Possible values are as follows:
8210 = Organizational Unit is imported
8211 = Domain user is imported
8212 = LDAP user is imported
ADMIN_PACKAGE_TYPES = Package events.
Possible values are as follows:
12289 = Package is created
12290 = Package is deleted
12291 = Package is exported
266 System Report data table
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
12292 = Package is moved to recycle bin
12293 = Package is now current
12294 = Package is added to other domain
12295 = Package properties are changed
12296 = Package deployment created
12297 = Package deployment deleted
12298 = Package deployment properties changed
12299 = Package updated
ADMIN_REPLICATION_TYPES = Replication events.
Possible values are as follows:
16385 = Replication partner is registered
16386 = Replication partner is deleted
16400 = Replicate now
ADMIN_OTHER_TYPES = Other events.
Possible values are as follows:
16387 = Remote site is deleted
16388 = Site properties are changed
16389 = Server properties are changed
16390 = Database properties are changed
16391 = Partner properties are changed
16392 = Site license is changed
16393 = Enforcer license changed
16394 = Replicate now
16395 = Back up now
16396 = External logging properties are changed
16397 = Site backup settings changed
16398 = Server deleted
16399 = Server certificate changed
16401 = Back up now
16402 = External logging properties are changed
System Report data table 267
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
16403 = Site backup settings changed
16404 = Server deleted
16405 = Server certificate changed
16406 = Enforcer group properties changed
For the Client-Server Activity System log. For this log type,
this field stores the event ID to query.
1 = Registration succeeded
2 = Registration failed
3 = Client reconnected
4 = Client disconnected
5 = Downloaded policy
6 = Downloaded Intrusion Prevention policy
7 = Downloaded sylink.xml
8 = Downloaded auto-upgrade file
9 = Server received log
10 = Log processing failed
11 = Server received learned application
12 = Server received client information
13 = Client information processing failed
14 = Hardware identity change
15 = Downloaded File Fingerprint list
20 = Downloaded content package
22 = Downloaded command
For Server Activity System log. For this log type, this field
stores the hard-coded English string key that is located to
the left of the = sign. To the right are listed the events that
are queried for by the group.
SERVER_EVENT_TYPES = Server events.
Possible values are as follows:
257 = Server startup successfully
258 = Server startup failed
268 System Report data table
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
259 = Server shut down gracefully
260 = Server created
SERVER_AGENT_EVENT_TYPES = Database maintenance
events.
Possible values are as follows:
267 = Client sweeping started
268 = Client sweeping summary
269 = Client sweeping succeeded
270 = Client sweeping failed
271 = Database logs have been swept
SERVER_BACKUP_EVENT_TYPES = Backup events.
Possible values are as follows:
1025 = Backup connection failed
1026 = Backup data fetch failed
1027 = Backup file write failed
1028 = Backup unknown failed
1029 = Backup success
1030 = Backup started
SERVER_RADIUS_EVENT_TYPES = Radius Server events.
Possible values are as follows:
1283 = Failed to start Radius Server. The radius port may
be used by another process.
1284 = Failed to start Radius Server. Set non-Block IO socket
failed.
1285 = Failed to start Radius Server. Create socket error.
SERVER_REPLICATION_EVENT_TYPES = Replication
events.
Possible values are as follows:
769 = Replication from remote site started
770 = Replication failed to login to remote site
771 = Unable to fetch changed data from remote site
System Report data table 269
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
772 = Replication finished successfully
773 = Replication failed
774 = Replication merge failed
775 = Unable to connect to remote site
776 = Name changed to resolve merge conflict
777 = Group full path name is too long for replication
778 = Retrieval of local changed data for remote site started
779 = Retrieval of local changed data for remote site finished
successfully
780 = Retrieval of local changed data for remote site failed
781 = The database had chosen to terminate replication to
end the deadlock
782 = Replication data is received
SERVER_IMPORT_EVENT_TYPES = Import events.
Possible values are as follows:
264 = Organization importing started
265 = Organization importing succeeded
266 = Organization importing failed
SERVER_INTRUSION_PREVENTION_EVEN = Policy content
updates.
Possible values are as follows:
1537 = Added Intrusion Prevention Library
1538 = Deleted Intrusion Prevention Library
1539 = Updated Intrusion Prevention Library
1540 = Intrusion Prevention Library is up to date
SERVER_LU_EVENT_TYPES = LiveUpdate events.
Possible values are as follows:
1793 = LiveUpdate started
1794 = LiveUpdate succeeded
1795 = LiveUpdate failed
1796 = LiveUpdate manual task succeeded
270 System Report data table
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
1797 = LiveUpdate manual task failed
1798 = LiveUpdate retry started
1799 = LiveUpdate retry succeeded
1800 = LiveUpdate retry failed and will try again
1801 = LiveUpdate manual task started
1802 = LiveUpdate retry over max window
1803 = LiveUpdate retry failed and will try again
1804 = LiveUpdate retry pass scheduled time
1805 = LiveUpdate All process launched
1806 = LiveUpdate All process exited abnormally
1807 = LiveUpdate next server
1808 = LiveUpdate All process finished
1809 = LiveUpdate All process failed to launch
1810 = LiveUpdate uploading content
1811 = LiveUpdate file path does not exist
1812 = LiveUpdate Content Catalog file has been inserted
1813 = LiveUpdate Content Catalog file has been updated
1814 = Client package has been downloaded
1815 = Client package patching failed
1816 = New LiveUpdate content has been downloaded
1817 = LiveUpdate wrong URL parameter
1824 = Antivirus and antispyware definitions Win64 11.0
MicroDefsB.CurDefs failed to update
1825 = Download is current
1826 = LiveUpdate rerun is triggered by content catalog
update
1818 = Failed to download LiveUpdate content
1819 = LiveUpdate content cleaned up
1820 = Host Integrity template has been updated
1821 = LiveUpdate timed out
System Report data table 271
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
1822 = LiveUpdate schedule updated
SERVER_NET_AUDIT_EVENT_TYPES = Find unmanaged
computers events.
Possible values are as follows:
2049 = Search uncliented hosts started
2050 = Search uncliented hosts finished normally
2051 = Search uncliented hosts finished abnormally
2052 = Client remote started
2053 = Client remote finished normally
2054 = Client remote finished abnormally
SERVER_OTHER_EVENT_TYPES = Other events.
Possible values are as follows:
261 = Site created
262 = Package published
263 = Site license exceeded
272 = Server upgrade success
273 = Scheduled reporting failed
274 = Security risk rating summary
1281 = An unexpected exception has occurred
1282 = Connect mail server failed
1286 = Server error
For the Client Activity System log. For this log, this field
stores the hard-coded English string key that is located to
the left of the = sign. To the right are listed the events that
are queried by the group. The event IDs are in hex.
AGENT_SYSTEM_INSTALL_EVENT_TYPES = Installation
events.
Possible values are as follows:
0x12070001 = Internal error
0x12070101 = Install complete
0x12070102 = Restart recommended
272 System Report data table
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
0x12070103 = Restart required
0x12070104 = Installation failed
0x12070105 = Uninstallation complete
0x12070106 = Uninstallation failed
0x12071037 = Symantec AntiVirus installed
0x12071038 = Symantec Firewall installed
0x12071039 = Uninstall
0x1207103A = Uninstall rolled-back
AGENT_SYSTEM_SERVICE_EVENT_TYPES = Service events.
Possible values are as follows:
0x12070201 = Service starting
0x12070202 = Service started
0x12070203 = Service start failure
0x12070204 = Service stopped
0x12070205 = Service stop failure
0x1207021A = Attempt to stop service
AGENT_SYSTEM_CONFIG_EVENT_TYPES = Configuration
events.
Possible values are as follows:
0x12070206 = Configuration import complete
0x12070207 = Configuration import error
0x12070208 = Configuration export complete
0x12070209 = Configuration export error
AGENT_SYSTEM_HI_EVENT_TYPES = Host Integrity
events.
Possible values are as follows:
0x12070210 = Host Integrity disabled
0x12070211 = Host Integrity enabled
AGENT_SYSTEM_IMPORT_EVENT_TYPES = Import events.
Possible values are as follows:
System Report data table 273
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
0x12070214 = Successfully imported advanced rule
0x12070215 = Failed to import advanced rule
0x12070216 = Successfully exported advanced rule
0x12070217 = Failed to export advanced rule
AGENT_SYSTEM_CLIENT_EVENT_TYPES = Client events.
Possible values are as follows:
0x12070218 = Client Engine enabled
0x12070219 = Client Engine disabled
0x12071046 = Proactive Threat Scanning is not supported
on this platform
0x12071047 = Proactive Threat Scanning Load Error
AGENT_SYSTEM_SERVER_EVENT_TYPES = Server events.
Possible values are as follows:
0x12070301 = Server connected
0x12070302 = No server response
0x12070303 = Server connection failed
0x12070304 = Server disconnected
0x120B0001 = Cannot reach server
0x120B0002 = Reconnected server
AGENT_SYSTEM_PROFILE_EVENT_TYPES = Policy events.
Possible values are as follows:
0x12070306 = New policy received
0x12070307 = New policy applied
0x12070308 = New policy failed
0x12070309 = Cannot download policy
0x120B0005 = Cannot download policy
0x1207030A = Have latest policy
0x120B0004 = Have latest policy
AGENT_SYSTEM_AV_EVENT_TYPES = Antivirus engine
events.
274 System Report data table
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
Possible values are as follows:
0x12071006 = Scan omission
0x1207100B = Virus behavior detected
0x1207100C = Configuration changed
0x12071010 = Definition file download
0x12071012 = Sent to Quarantine Server
0x12071013 = Delivered to Symantec
0x12071014 = Security Response backup
0x12071015 = Scan aborted
0x12071016 = Symantec AntiVirus Auto-Protect load error
0x12071017 = Symantec AntiVirus Auto-Protect enabled
0x12071018 = Symantec AntiVirus Auto-Protect disabled
0x1207101A = Scan delayed
0x1207101B = Scan restarted
0x12071027 = Symantec AntiVirus is using old virus
definitions
0x12071041 = Scan suspended
0x12071042 = Scan resumed
0x12071043 = Scan duration too short
0x12071045 = Scan enhancements failed
AGENT_SYSTEM_LICENSE_EVENT_TYPES = License events.
Possible values are as follows:
0x1207101E = License warning
0x1207101F = License error
0x12071020 = License in grace period
0x12071023 = License installed
0x12071025 = License up-to-date
AGENT_SYSTEM_SECURITY_EVENT_TYPES = Security
events.
Possible values are as follows:
System Report data table 275
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
0x1207102B = Computer not compliant with security policy
0x1207102C = Computer compliant with security policy
0x1207102D = Tamper attempt
AGENT_SYSTEM_OTHER_EVENT_TYPES = Other events.
Possible values are as follows:
0x1207020A = Email post OK
0x1207020B = Email post failure
0x1207020C = Update complete
0x1207020D = Update failure
0x1207020E = Manual location change
0x1207020F = Location changed
0x12070212 = Old Rasdll detected
0x12070213 = Auto-update postponed
0x12070305 = Mode changed
0x1207030B = Cannot apply HI script
0x12070500 = System message from device control
0x12070600 = System message from anti-buffer overflow
driver
0x12071021 = Access denied warning
0x12071022 = Log forwarding error
0x12071044 = Client moved
For the Enforcer Activity System log. For this log, this field
stores the hard-coded English string key that is located to
the left of the = sign. To the right are listed the events that
are queried by the group. The event IDs are in hex.
ENFORCER_POLICY_MANAGER_EVENT_TY = Management
events.
Possible values are as follows:
0x101 = Connected to Symantec Endpoint Protection
Manager
0x102 = Lost connection to Symantec Endpoint Protection
Manager
276 System Report data table
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
0x103 = Applied policy downloaded from Symantec Endpoint
Protection Manager
0x104 = Failed to apply policy downloaded from Symantec
Endpoint Protection Manager
0x107 = Applied management server configuration
0x108 = Failed to apply management server configuration
ENFORCER_ENFORCER_EVENT_TYPES = Enforcer events.
Possible values are as follows:
0x201 = Enforcer started
0x202 = Enforcer stopped
0x203 = Enforcer paused
0x204 = Enforcer resumed
0x205 = Enforcer disconnected from server
0x301 = Enforcer failover enabled
0x302 = Enforcer failover disabled
0x303 = Enforcer in standby mode
0x304 = Enforcer in primary mode
0x305 = Enforcer short
0x306 = Enforcer loop
ENFORCER_ENABLE_EVENT_TYPES = Enable events.
Possible values are as follows:
0x401 = Forward engine pause
0x402 = Forward engine start
0x403 = DNS enforcer enabled
0x404 = DNS enforcer disabled
0x405 = DHCP enforcer enabled
0x406 = DHCP enforcer disabled
0x407 = Allow all enabled
0x408 = Allow all disabled
ENFORCER_PROFILE_EVENT_TYPES = Policy events.
System Report data table 277
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
Possible values are as follows:
0x501 = Seat number change
0x601 = Failed to create policy parser
0x602 = Failed to import policy downloaded from Symantec
Endpoint Protection Manager
0x603 = Failed to export policy downloaded from Symantec
Endpoint Protection Manager
0x701 = Incorrect customized attribute
EVENT_DESC nvarchar(255),
varchar(255), not null
278 System Report data table
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
MSG_ID varchar(255), not null
System Report data table 279
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
This field stores the hard-coded English string key that is
found to the left of the = sign. To the right is a description
of the kinds of error messages that are queried. % or blank
in this field means no filtering (all records).
For the Administrative System log.
Possible values are as follows:
ERR_SERVER = Server error messages
ERR_INVALID_PARAMETER = Invalid parameter error
messages
ERR_GENERAL = General error messages
ERR_ROOT = Root error messages
ERR_AUTHENTICATION = Login-related error messages
ERR_METADATA = Metadata error messages
ERR_TRANSACTION = Transaction error messages
ERR_DATASTORE = Datastore error messages
ERR_LICENSE = License error messages
ERR_CERTIFICATE = Certificate error messages
ERR_GROUP = Group error messages
ERR_FILE = File related error messages
ERR_LIVEUPDATE = LiveUpdate error messages
ERR_OTHER = Other error messages
ERR_NONE = None
For the Server Activity System log:
ERR_SERVER = Server error messages
ERR_INVALID_PARAMETER = Invalid parameter error
messages
ERR_GENERAL = General error messages
ERR_ROOT = Root error messages
ERR_AUTHENTICATION = Login-related error messages
ERR_METADATA = Metadata error messages
ERR_TRANSACTION = Transaction error messages
280 System Report data table
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
ERR_DATASTORE = Datastore error messages
ERR_LICENSE = License error messages
ERR_CERTIFICATE = Certificate error messages
ERR_GROUP = Group error messages
ERR_FILE = File related error messages
ERR_LIVEUPDATE = LiveUpdate error messages
ERR_OTHER = Other error messages
ERR_NONE = None
ENFORCERLIST Comma-separated Enforcer names by which to filter. nvarchar(255),
varchar(255), not null
ENFORCER_TYPE Possible values are as follows: int, null
0 = Gateway Enforcer
1 = LAN Enforcer
2 = DHCP Enforcer
3 = Integrated Enforcer
4 = NAP Enforcer
5 = Peer-to-Peer Enforcer
SERVERGROUPLIST Comma-separated domain names by which to filter. These nvarchar(255),
names can contain wildcard characters. varchar(255), not null
CLIENTGROUPLIST Comma-separated group names by which to filter. These nvarchar(255),
names can contain wildcard characters. varchar(255), not null
SITELIST Comma-separated site names by which to filter. These nvarchar(255),
names can contain wildcard characters. varchar(255), not null
PARENTSERVERLIST Comma-separated server names by which to filter. These nvarchar(255),
names can contain wildcard characters. varchar(255), not null
COMPUTERLIST Comma-separated computer names by which to filter. These nvarchar(512),
names can contain wildcard characters. varchar(512), not null
IPADDRESSLIST Comma-separated IP addresses by which to filter. These nvarchar(255),
names can contain wildcard characters. varchar(255), not null
System Report data table 281
System Report schema
Table 72-1 System Report schema (continued)
Database Field Name Comment Data Type
USERLIST Comma-separated user names by which to filter nvarchar(255),
varchar(255), not null
POLICYNAMELIST Comma-separated policy names by which to filter. These nvarchar(255),
names can contain wildcard characters. varchar(255), not null
EVENTSOURCELIST Comma-separated event names by which to filter. nvarchar(255),
varchar(255), not null
SORTORDER The column on which to sort for log views. varchar(32), not null
SORTDIR The sort direction. varchar(5), not null
Possible values are as follows:
Desc = Descending
Asc = Ascending
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
REPORT_IDX Not used. int, not null
REPORTINPUTS Special parameters if a report needs them. nvarchar(64), varchar(64),
not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
DELETED The deleted flag of the schema object. tinyint, not null
Possible values are as follows:
0 = Deleted
1 = Not Deleted
282 System Report data table
System Report schema
Chapter 73
System State data table
This chapter includes the following topics:
■ System State schema
System State schema
Table 73-1 describes the database schema for system state information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SYSTEM_STATE.
Table 73-1 System State schema
Database Field Name Comment Data Type
CHECKSUM The checksum of XML content. char(32), not null
CONTENT The XML content of the schema image, not null
object.
DELETED tinyint, not null
ID* The GUID of the schema object. char(32), not null
OWNER The GUID of the corresponding char(32), null
schema object.
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.
284 System State data table
System State schema
Table 73-1 System State schema (continued)
Database Field Name Comment Data Type
TYPE The type name of the schema object. varchar(256), not null
USN The update serial number; used by bigint, not null
replication.
DOMAIN_ID The GUID of the domain that contains char(32), null
the state object.
RESERVED_INT1 int, null
RESERVED_INT2 int, null
RESERVED_BIGINT1 bigint, null
RESERVED_BIGINT2 bigint, null
RESERVED_CHAR1 char(32), null
RESERVED_CHAR2 char(32), null
RESERVED_varchar1 nvarchar(260), varchar(260), null
RESERVED_BINARY varbinary(2000), null
Chapter 74
Threat Report data table
This chapter includes the following topics:
■ Threat Report schema
Threat Report schema
Table 74-1 describes the database schema for threat report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_THREATREPORT.
Table 74-1 Threat Report schema
Database Field Name Comment Data Type
THREATFILTER_IDX* Primary Key. char(32), not null
USER_ID The administrator GUID. char(32), not null
FILTERNAME The user-specified name for this saved 'report'. nvarchar(255),
varchar(255), not null
STARTDATEFROM The starting date. datetime, not null
STARTDATETO The ending date. datetime, not null
286 Threat Report data table
Threat Report schema
Table 74-1 Threat Report schema (continued)
Database Field Name Comment Data Type
RELATIVEDATETYPE Possible values are as follows: int, not null
0 = past week
1 = past month
2 = past three months
3 = past year
4 = past 24 hours
5 = current month
FILTER_TYPE Possible values are as follows: tinyint, null
1 = Risk
2 = Proactive Threat Protection
PRODUCT Not used. varchar(32), not null
EVENTTYPE The possibilities here are in the ALERTMSG table. varchar(32), not null
ACTUALACTION The possibilities here are in the ACTUALACTION varchar(32), not null
table.
SOURCE A hard-coded English lookup key. varchar(255), not null
Possible values are as follows:
Scheduled Scan
Manual Scan
Real Time Scan
Heuristic Scan
Console
Definition downloader
System
Startup Scan
Idle Scan
Manual Quarantine
SORTORDER The column to use for the log view sort. varchar(32), not null
SORTDIR Either 'asc' or 'desc'. varchar(5), not null
Threat Report data table 287
Threat Report schema
Table 74-1 Threat Report schema (continued)
Database Field Name Comment Data Type
TIMEBASE Deprecated. varchar(32), not null
TREATCOMPRESSED Deprecated. varchar(32), not null
SERVERGROUPLIST A comma-separated list of domains by which to nvarchar(255),
filter. These names can contain wildcard characters. varchar(255), not null
SERVERGROUPINCLUDE Whether to include (1) or exclude (0) the domains int, not null
in the list. Always set to 1.
CLIENTGROUPLIST A comma-separated list of client groups by which nvarchar(255),
to filter. These names can contain wildcard varchar(255), not null
characters.
CLIENTGROUPINCLUDE Whether to include (1) or exclude (0) the client int, not null
groups in the list. Always set to 1.
PARENTSERVERLIST A comma-separated list of Symantec Endpoint nvarchar(255),
Protection Manager servers by which to filter. These varchar(255), not null
names can contain wildcard characters.
PARENTSERVERINCLUDE Whether to include (1) or exclude (0) the servers in int, not null
the list. (Always set to 1.)
COMPUTERLIST A comma-separated list of computers by which to nvarchar(512),
filter. These names can contain wildcard characters. varchar(512), not null
COMPUTERINCLUDE Whether to include (1) or exclude (0) the computers int, not null
in the list. (Always set to 1.)
IPADDRESSLIST A comma-separated list of IP addresses by which nvarchar(255),
to filter. These names can contain wildcard varchar(255), not null
characters.
IPADDRESSINCLUDE Whether to include (1) or exclude (0) the IP int, not null
addresses in the list. (Always set to 1.)
CLIENTUSERLIST A comma-separated list of users by which to filter. nvarchar(255),
These names can contain wildcard characters. varchar(255), not null
CLIENTUSERINCLUDE Whether to include (1) or exclude (0) the users in int, not null
the list. (Always set to 1.)
HPP_APP_LIST A comma-separated list of heuristic risks by which nvarchar(255),
to filter. These names can contain wildcard varchar(255), not null
characters.
288 Threat Report data table
Threat Report schema
Table 74-1 Threat Report schema (continued)
Database Field Name Comment Data Type
THREATLIST A comma-separated list of risks by which to filter. nvarchar(255),
These names can contain wildcard characters. varchar(255), not null
THREATINCLUDE Whether to include (1) or exclude (0) the risks in int, not null
the list. (Always set to 1.)
THREATTYPELIST The possibilities here are in the VIRUSCATEGORY varchar(255), not null
table. It is no longer a list but a single item.
THREATTYPEINCLUDE Whether to include (1) or exclude (0) the risk types int, not null
in the list Always set to 1.
THREATCATEGORY Possible values are as follows: varchar(255), not null
= -1 = Unknown
>= 1 = Very low risk
>= 2 = Low risk
>= 3 = Moderate risk
>= 4 = Severe risk
>= 5 = Very Severe
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
REPORT_IDX Not used. int, not null
REPORTINPUTS Special parameters if a report needs them. nvarchar(255),
varchar(255), not null
FROMUSERLIST Deprecated. nvarchar(255),
varchar(255), not null
FROMUSERINCLUDE Deprecated. int, not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
DELETED Deleted row: tinyint, not null
0 = Not deleted
1 = Deleted
Threat Report data table 289
Threat Report schema
Table 74-1 Threat Report schema (continued)
Database Field Name Comment Data Type
FULL_CHARTS An administrator-specified list of charts to include varchar(255), not null
in the Comprehensive Risk Report.
290 Threat Report data table
Threat Report schema
Chapter 75
Version data table
This chapter includes the following topics:
■ Version schema
Version schema
Table 75-1 describes the database schema for version information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_VERSION.
Table 75-1 Version schema
Database Field Name Comment Data Type
PRODUCT* Primary Key. char(20), not null
VERSION The version of Reporting. char(10), not null
DBSCHEMA The schema version. int, not null
SR_NONCE For internal usage only. char(64), null
292 Version data table
Version schema
Chapter 76
Virus data table
This chapter includes the following topics:
■ Virus schema
Virus schema
Table 76-1 describes the database schema for virus information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_VIRUS.
Table 76-1 Virus schema
Database Field Name Comment Data Type
VIRUSNAME_IDX* Primary Key, Index of virus / threat. char(32), not null
VIRUSNAME The name of the virus / threat nvarchar(255), varchar(255),
not null
CATEGORY The current category (as downloaded from int, not null
Symantec's Web site ). Values are 1 through 5,
where 1 is very low and 5 is very severe. A value
of -1 means unknown or not applicable. This
rating applies only to viral threats.
294 Virus data table
Virus schema
Table 76-1 Virus schema (continued)
Database Field Name Comment Data Type
MAXCATEGORY The maximum category that the virus has int, not null
reached. Values are 1 through 5. A value of -1
means unknown or not applicable. This rating
applies only to viral threats.
TYPE The threat type. int, null
Possible values are as follows:
0 = Viral
1 = Non-Viral malicious
2 = Malicious
3 = Antivirus - Heuristic
4 = Security risk
5 = Hack tool
6 = Spyware
7 = Trackware
8 = Dialer
9 = Remote access
10 = Adware
11 = Jokeware
12 = Client compliancy
13 = Generic load point
14 = Proactive Threat Scan - Heuristic
15 = Cookie
Virus data table 295
Virus schema
Table 76-1 Virus schema (continued)
Database Field Name Comment Data Type
TYPE2 The threat location. int, null
Possible values are as follows:
0 = Boot virus
1 = File virus
2 = Mutation virus
3 = Macro virus
4 = File virus
5 = File virus
6 = Memory virus
7 = Memory OS virus
8 = Memory mcb virus
9 = Memory highest virus
11 = Virus behavior
12 = Virus behavior
13 = Compressed file
14 = Heuristic
DISCOVERED When Symantec first discovered the threat (as datetime, not null
downloaded from Symantec's Web site ).
VID The unique identifier for a virus that Security bigint, not null
Response sets.
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered bigint, not null
or modified in the database, in milliseconds since
1970.
DELETED Deleted row: tinyint, not null
0 = Not deleted
1 = deleted
PATTERN_IDX Pointer to the Pattern table that protects against char(32), not null
this threat.
296 Virus data table
Virus schema
Table 76-1 Virus schema (continued)
Database Field Name Comment Data Type
TOP_THREAT Possible values are as follows: tinyint, not null
0 = Not a top threat
1 = top threat
LATEST_THREAT 0 = not a latest threat tinyint, not null
1 = latest threat
STEALTH Assesses how easy it is to determine if a security int, not null
risk is present on a computer.
Possible values are as follows:
0 = No rating
1,2 = Low
3 = Medium
4> = High
-1 means not applicable. This rating applies only
to non-viral threats.
REMOVAL Skill level that is required to remove the threat int, not null
from a given computer.
Possible values are as follows:
0 = No rating
1, 2 = Low
3 = Medium
4 >= High
-1 means not applicable. This rating applies only
to non-viral threats.
Virus data table 297
Virus schema
Table 76-1 Virus schema (continued)
Database Field Name Comment Data Type
PERFORMANCE Measures the negative impact that the presence int, not null
of a security risk has on the computer's
performance.
Possible values are as follows:
0= No rating
1,2= Low
3= Medium
4>= High
-1 means not applicable. This rating applies only
to non-viral threats.
PRIVACY The level of privacy that is lost due to the int, not null
presence of a security risk on a computer.
Possible values are as follows:
0= No rating
1, 2 = Low
3 = Medium
4 >= High
-1 means not applicable. This rating applies only
to non-viral threats.
DEPENDENCY The number of dependent components that the int, not null
risk installs.
Possible values are as follows:
0 = No rating
1, 2 = Low
3 = Medium
4 >= High
-1 means not applicable. This rating applies only
to non-viral threats.
OVERALL An average of all the security risk ratings. This int, not null
rating applies only to non-viral threats.
298 Virus data table
Virus schema
Chapter 77
Virus Category data table
This chapter includes the following topics:
■ Virus Category schema
Virus Category schema
Table 77-1 describes the database schema for virus category information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_VIRUSCATEGORY.
Table 77-1 Virus Category schema
Database Field Name Comment Data Type
CATEGORY* Primary key. int, not null
300 Virus Category data table
Virus Category schema
Table 77-1 Virus Category schema (continued)
Database Field Name Comment Data Type
CATEGORY_DESC Category, Category_Desc. An English varchar(255), not null
string key that is used for a lookup
Possible values are as follows:
0 = Viral
1 = Non-Viral malicious
2 = Malicious
3 = Heuristic
4 is no longer used
5 = Hack tool
6 = Spyware
7 = Trackware
8 = Dialer
9 = Remote access
10 = Adware
11 = Jokeware
12 = Client compliancy
13 = Generic load point
14 = ApplicationHeuristic
15 = Cookie
Chapter 78
Database Schema Views
This chapter includes the following topics:
■ Purposes of views
Purposes of views
The database contains a number of views to enable you to look at the tables in
different ways. The view names begin with the letter V to distinguish them from
the tables. The following table lists these views and the purpose of each.
Table 78-1 Purposes of views
View Purpose
V_AGENT_BEHAVIOR_LOG Query client activities for agents.
V_AGENT_PACKET_LOG Query packet traffic events for agents.
V_AGENT_SECURITY_LOG Query security events for agents.
V_AGENT_SYSTEM_LOG Query system events for agents.
V_AGENT_TRAFFIC_LOG Query traffic events for agents.
V_ALERTS Query risk and TruScan events with human-readable IP address
information.
V_ENFORCER_CLIENT_LOG Query client activities for Enforcers.
V_ENFORCER_SYSTEM_LOG Query system activities for Enforcers.
V_ENFORCER_TRAFFIC_LOG Query traffic activities for Enforcers.
V_LAN_DEVICE_DETECTED Query detected devices with human-readable IP address
information.
302 Database Schema Views
Purposes of views
Table 78-1 Purposes of views (continued)
View Purpose
V_LAN_DEVICE_EXCLUDED Query known devices with human-readable IP address
information.
V_NETWORK_SCAN_RESULT Query network scan results with human-readable IP address
information.
V_SECURITY_VIEW Query cross-technology security events.
V_SEM_COMPUTER Query computer information with human-readable IP address
information.
V_SERVER_ADMIN_LOG Query administrator activities for servers.
V_SERVER_CLIENT_LOG Query client activities for servers.
V_SERVER_ENFORCER_LOG Query Enforcer activities for servers.
V_SERVER_POLICY_LOG Query policy change activities for servers.
V_SERVER_SYSTEM_LOG Query system activities for servers.