You can choose to have the App Control Server export a daily archive of events to a GZIP-compressed CSV file named in the format yyyy-mm-dd.csv.gz.
To enable this feature, go to the Events tab of the System Configuration page, click Edit, check the Archive Events Enabled box, and click Update. The location of these archive files is in a subfolder of the server installation directory, by default:
C:\Program Files (x86)\Bit9\Parity Server\archivelogs\
The following table describes the columns in these archive files.
- Event Archive CSV File Columns
Archive CSV column | Note |
---|---|
TIMESTAMP | Time event occurred on agent (in UTC) |
RECEIVEDTIMESTAMP | Time event was received on server (in UTC) |
EVENTTYPE | Event type name |
EVENTSUBTYPE | Event subtype name |
COMPUTER | Event source (computer name or 'System') |
COMPUTER_ID | Event source (Unique numeric ID, 0 for ‘system’) |
PLATFORM | Platform of the computer associated with the event |
IP_ADDRESS | IP address associated with the event |
MESSAGE | Event description |
POLICY | Name of the policy associated with the event |
FILENAME | Full file path |
PROCESSNAME | Name of the process associated with the event |
HASH | File hash |
HASH_TYPE | Type of the file hash (2 = SHA1, 3=MD5, 5=Sha256, 6=MSI) |
INSTALLER_HASH | Installer hash |
INSTALLER_HASH_TYPE | Type of the installer hash (2 = SHA1, 3=MD5, 5=Sha256, 6=MSI) |
RULE_NAME | Name of the rule associated with the event (if any) |
RULE_TYPE | Rule type of the rule associated with the event |
BAN_NAME | For blocked file events, the name of the ban that blocked the file action; some bans are unnamed |
UPDATER_NAME | Name of the Updater associated with the event (if any) |
SEVERITY | Event severity |
USERNAME | Name of user associated with the event |
PROCESS_HASH | Hash of the process associated with the event |
PROCESS_HASH_TYPE | Hash type of the process associated with the event |
ROOT_NAME | Installer name associated with the event |
GLOBAL_STATE | Global state of the file associated with the event (Approved/Unapproved/Banned) |
INDICATOR_NAME | Name of the threat indicator associated with the event (if any) |
FILE_TRUST | File trust from Carbon Black File Reputation of the file associated with the event. Pending means that file lookup was not yet performed but will be. (Conditional) -2 pending -1 unknown 0-10 Trust value |
FILE_THREAT | File threat from Carbon Black File Reputation of the file associated with the event. Pending means that file lookup was not yet performed but will be. (Conditional) -2 pending -1 unknown 0 No threat 1 Potential risk 2 Malicious |
PROCESS_TRUST | Parent process trust from Carbon Black File Reputation of the file associated with the event. Pending means that file lookup was not yet performed but will be. (Conditional) -2 pending -1 unknown 0-10 Trust value |
PROCESS_THREAT | Parent process threat from Carbon Black File Reputation of the file associated with the event. Pending implies that file lookup was not yet performed but will be. (Conditional) -2 pending -1 unknown 0 No threat 1 Potential risk 2 Malicious |
USAGE_COUNTER | Prevalence of file related to this event |
PROCESS_USAGE_COUNTER | Prevalence of parent process related to this event |
PROCESS_KEY | Unique proprietary key identifying the instance of the process on a specific computer |
COMMAND_LINE | Command line in the event description. Command lines may include proprietary information (e.g., passwords), and so their inclusion in events is optional. |
UNIFIED_SOURCE | In a Unified Management environment, the server that initiated an action. |