Schema Reference Guide
Schema Reference Guide
Protection Manager
Database Schema Reference
Legal Notice
Copyright © 2008 Symantec Corporation. All rights reserved.
This Symantec product may contain third party software for which Symantec is required
to provide attribution to the third party (“Third Party Programs”). Some of the Third Party
Programs are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under
those open source or free software licenses. Please see the Third Party Legal Notice Appendix
to this Documentation or TPIP ReadMe File accompanying this Symantec product for more
information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
20330 Stevens Creek Blvd.
Cupertino, CA 95014
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical
Support’s primary role is to respond to specific queries about product features
and functionality. The Technical Support group also creates content for our online
Knowledge Base. The Technical Support group works collaboratively with the
other functional areas within Symantec to answer your questions in a timely
fashion. For example, the Technical Support group works with Product Engineering
and Symantec Security Response to provide alerting services and virus definition
updates.
Symantec’s maintenance offerings include the following:
■ A range of support options that give you the flexibility to select the right
amount of service for any size organization
■ Telephone and Web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade assurance that delivers automatic software upgrade protection
■ Global support that is available 24 hours a day, 7 days a week
■ Advanced features, including Account Management Services
For information about Symantec’s Maintenance Programs, you can visit our Web
site at the following URL:
www.symantec.com/techsupp/
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Customer Service is available to assist with the following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and maintenance contracts
■ Information about the Symantec Buying Programs
■ Advice about Symantec's technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs or manuals
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement,
please contact the maintenance agreement administration team for your region
as follows:
Symantec Early Warning Solutions These solutions provide early warning of cyber attacks, comprehensive threat
analysis, and countermeasures to prevent attacks before they occur.
Managed Security Services These services remove the burden of managing and monitoring security devices
and events, ensuring rapid response to real threats.
Consulting Services Symantec Consulting Services provide on-site technical expertise from
Symantec and its trusted partners. Symantec Consulting Services offer a variety
of prepackaged and customizable options that include assessment, design,
implementation, monitoring, and management capabilities. Each is focused on
establishing and maintaining the integrity and availability of your IT resources.
Educational Services Educational Services provide a full array of technical training, security
education, security certification, and awareness communication programs.
To access more information about Enterprise services, please visit our Web site
at the following URL:
www.symantec.com
Select your country or language from the site index.
Contents
rows can have the same Primary Key value; therefore, a Primary Key value always
uniquely identifies a single row. More than one key can uniquely identify rows in
a table, each of these keys is called a Candidate Key. Only one candidate can be
chosen as the Primary Key of a table; all other Candidate Keys are known as
Alternate Keys.
In a normalized table, all of a row's data values depend completely on the Primary
Key. For example, in a normalized employee table with EmployeeID as the Primary
Key, all columns should contain data that is related to a specific employee. The
table should not have a DepartmentName column because the name of the
department depends on a Department ID, not on an Employee ID.
Chapter 2
Actual Action data table
This chapter includes the following topics:
-1 = Action invalid
1 = Quarantined
2 = Renamed
3 = Deleted
4 = Left alone
5 = Cleaned
7 = Saved
9 = Moved back
10 = Renamed back
11 = Undone
12 = Bad
13 = Backed up
14 = Pending repair
15 = Partially repaired
17 = Excluded
18 = Restart processing
19 = Cleaned by deletion
20 = Access denied
21 = Process terminated
22 = No repair available
98 = Suspicious
99 = Details pending
DOMAIN_ID The GUID for the currently logged in domain. char(32), not null
AUTOREFRESH The user-defined auto refresh value for all logs (computer int, not null
status, notifications, scan, and so on).
LASTCHANGE The last time that the user accessed the console. int, not null
LASTSPMTIME The last time of a successful keep alive to application server. int, not null
22 Admin User data table
Admin User schema
Chapter 4
Agent Behavior Logs data
table
This chapter includes the following topics:
USN A USN-based serial number; this ID is not unique. bigint, not null
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
GROUP_ID The GUID of the group to which the log belongs. char(32), not null
COMPUTER_ID The GUID of the client computer that is associated char(32), not null
with the agent log.
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
EVENT_ID An event ID from the Symantec Endpoint Protection int, not null
agent.
0 is most serious.
0 = allow
1 = block
2 = ask
3 = continue
4 = terminate
Agent Behavior Logs data table 25
Agent Behavior Logs schema
ENCODED_API_NAME nvarchar(256),
varchar(256), null
END_TIME The end time of the security issue. End time is an bigint, null
optional field because Symantec may fail to detect the
exact end time of traffic, like UDP. In those cases, the
end time is equal to start time.
RULE_ID The ID of the rule that the event triggered. It is always char(32), null
0 if the rule ID is not specified in the security rule. The
field is helpful to security rule troubleshooting. If
multiple rules match, RULE_ID logs the rule that has
final decision on PacketProc (pass/block/drop).
RULE_NAME The name of the rule that the event triggered. It is nvarchar(256),
always an empty string if the rule name is not specified varchar(256), null
in the security rule. It is also used for troubleshooting.
In theory, the IT admin can know the rule by ID.
However, the name gives the user a direct view of the
rule that can be used.
CALLER_PROCESS_ID The ID of the process that triggers the logging. bigint, null
CALLER_PROCESS_NAME The full path name of the application that is involved. nvarchar(256),
It may be empty if the application is unknown, if the varchar(256), null
operating system is involved, or if no application is
involved. Also, it may be empty if the profile says “don’t
log the application name in the raw traffic log.”
CALLER_RETURN_ADDRESS The return address of the caller. This field allows the bigint, null
software to detect the calling module that makes the
API call.
26 Agent Behavior Logs data table
Agent Behavior Logs schema
PARAMETER The parameters that were used in the API call. Each nvarchar(256),
parameter was converted to STRING format and varchar(256), null
separated by one space character. Double quotation
characters within the string are escaped by a backslash
(\) character.
ALERT ALERT indicates whether this event is counted during int, null
alert notification processing at the server. ALERT is
true if Tamper Protection logs the event. It is false
otherwise.
True = 1
False = 0
SEND_SNMP_TRAP SEND_SNMP_TRAP reflects the send SNMP trap action. tinyint, null
SEND_SNMP_TRAP is true if send is true.
RESERVED_varchar1 nvarchar(260),
varchar(260), null
RESERVED_BINARY varbinary(2000),
null
USN A USN-based serial number; this ID is not unique. bigint, not null
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
GROUP_ID The GUID of the group to which the log belongs. char(32), not null
COMPUTER_ID The GUID of the client computer that is associated with the char(32), not null
agent packet log.
TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
EVENT_ID An event ID from the Symantec Endpoint Protection agent. int, not null
REMOTE_HOST_NAME The name of the remote computer. It may be empty if the nvarchar(64), varchar(64),
name resolution failed. null
LOCAL_PORT The TCP/UDP port in local computer (host byte-order). It is int, null
valid only on TSE_TRAFFIC_TCP and TSE_TRAFFIC_UDP.
Otherwise, it is always zero.
REMOTE_PORT The TCP/UDP port in remote computer (host byte-order). int, null
It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.
Yes = 1
No = 0
APP_NAME The full path name of the application involved. It may be nvarchar(256),
empty if an unknown application is involved or if no varchar(256), null
application is involved. For example, the ping of death
denial-of-service attack doesn’t have an AppName because
it attacks the operating system.
ALERT ALERT reflects the alert attribute in the profile action. If int, null
the Network Threat Protection policy indicates that the
event should be considered for server-side notification
generation, the ALERT field is set to 1.
Yes = 1
No = 0
SEND_SNMP_TRAP SEND_SNMP_TRAP reflects the send SNMP trap action. tinyint, null
SEND_SNMP_TRAP is true if send is true.
Yes = 1
No = 0
EVENT_DATA Additional data in binary format. This field is optional. varbinary(2000), null
RESERVED_varchar1 nvarchar(260),
varchar(260), null
32 Agent Packet Logs data table
Agent Packet Logs schema
USN A USN-based serial number; this ID is not unique. bigint, not null
34 Agent Security Logs data table
Agent Security Logs schema
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
GROUP_ID The GUID of the group to which the log belongs. char(32), not null
COMPUTER_ID The GUID of the client computer that is associated with char(32), not null
the agent security log.
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
Agent Security Logs data table 35
Agent Security Logs schema
SEVERITY The level of severity that is defined in Security Rule. int, not null
Critical = 0 - 3
Major = 4 - 7
Minor = 8 - 11
Info = 12 - 15
NETWORK_PROTOCOL The protocol type: Enum (OTHERS = 1; TCP = 2; UDP = 3; tinyint, null
ICMP = 4)
END_TIME The end time of the security issue. End time is an optional bigint, null
field because the software may fail to detect the exact end
time of traffic, like UDP. In those cases, the end time is
equal to the begin time.
REPETITION The number of attacks. When a hacker launches a mass int, null
attack, it may be damped to one event by the log system.
APP_NAME The full path of the application involved. It may be empty nvarchar(256),
if an unknown application is involved or if no application varchar(256), null
is involved. For example, the ping of death
denial-of-service attack doesn’t have an AppName because
it attacks the operating system itself.
EVENT_DESC A description of the event. Usually, the first line of the nvarchar(2000),
description is treated as “summary". varchar(4000), null
EVENT_DATA Additional data in binary format. This field is optional. varbinary(3000), null
ALERT ALERT reflects the alert attribute in profile action. If the tinyint, null
Network Threat Protection policy indicates that the event
should be considered for server-side notification
generation, the ALERT field is set to 1.
Yes = 1
No = 0
SEND_SNMP_TRAP SEND_SNMP_TRAP reflects the send SNMP trap action. tinyint, null
SEND_SNMP_TRAP is true if send is true.
Yes = 1
No = 0
LOCATION_NAME The location that is used when the event occurs. nvarchar(256),
varchar(256), null
RESERVED_varchar1 nvarchar(260),
varchar(260), null
USN A USN-based serial number; this ID is not unique. bigint, not null
40 Agent System Logs data table
Agent System Logs schema
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
GROUP_ID The GUID of the group to which the log belongs. char(32), not null
COMPUTER_ID The GUID of the client computer that is associated with the char(32), not null
agent system log.
TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
Agent System Logs data table 41
Agent System Logs schema
AGENT_SYSTEM_INSTALL_EVENT_TYPES = Installation
events:
0x12071039 = Uninstall
AGENT_SYSTEM_CONFIG_EVENT_TYPES = Configuration
events:
AGENT_SYSTEM_SECURITY_EVENT_TYPES = Security
events:
INFO = 0
WARNING = 1
ERROR = 2
FATAL = 3
EVENT_SOURCE The data source, such as NETPORT, NATSRV, etc. varchar(32), not null
EVENT_DESC A description of the event. Usually, the first line of the nvarchar(1024),
description is treated as “summary.” varchar(2048), null
EVENT_DATA Additional data in binary format. This field is optional. varbinary(2000), null
SEND_SNMP_TRAP SEND_SNMP_TRAP reflects the send SNMP trap action. tinyint, null
SEND_SNMP_TRAP is true if send is true.
Yes = 1
No = 0
RESERVED_varchar1 nvarchar(260),
varchar(260), null
Agent System Logs data table 47
Agent System Logs schema
USN A USN-based serial number; this ID is not unique. bigint, not null
50 Agent Traffic Logs data table
Agent Traffic Logs schema
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
GROUP_ID The GUID of the group to which the log belongs. char(32), not null
COMPUTER_ID The GUID of the client computer that is associated with the char(32), not null
agent traffic log.
TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
EVENT_ID An event ID from Symantec Endpoint Protection agent. int, not null
308 = IP packet
Critical = 0 - 3
Major = 4 - 7
Minor = 8 - 11
Info = 12 - 15
REMOTE_HOST_NAME The name of the remote computer. It may be empty if the nvarchar(64), varchar(64),
name resolution failed. null
NETWORK_PROTOCOL The protocol type: Enum (OTHERS = 1; TCP = 2; UDP = 3; tinyint, null
ICMP = 4).
LOCAL_PORT The TCP/UDP port in the local computer (host byte-order). int, null
It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.
REMOTE_PORT The TCP/UDP port in the remote computer (host byte-order). int, null
It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.
END_TIME The end time of the security issue. End time is an optional bigint, null
field because we may fail to detect the exact end time of
traffic, like UDP. In those cases, the end time is equal to
begin time.
REPETITION The number of attacks. Sometimes, when a hacker launches int, null
a mass attack, it may be damped to one event by the log
system.
Yes = 1
No = 0
52 Agent Traffic Logs data table
Agent Traffic Logs schema
RULE_ID The ID of rule that the event triggered. It is always 0 if rule char(32), null
ID is not specified in security rule. The field is helpful to
security rule troubleshooting. If multiple rules matched, it
logs the rule that has final decision on PacketProc
(pass/block/drop).
RULE_NAME The name of rule that the event triggered. It is always an nvarchar(256),
empty string if a rule name is not specified in the security varchar(256), null
rule. It is also used for troubleshooting. In theory, an IT
admin can know the rule by its ID. However, a name gives
the user a direct view of a rule that can be used.
ALERT ALERT reflects the alert attribute in the profile action. If tinyint, null
the Network Threat Protection policy indicates that the
event should be considered for server-side notification
generation, the ALERT field is set to 1.
Yes = 1
No = 0
SEND_SNMP_TRAP It reflects the send SNMP trap action. SEND_SNMP_TRAP tinyint, null
is true if send is true.
Yes = 1
No = 0
LOCATION_NAME The location that was used when event occurs. nvarchar(256),
varchar(256), null
RESERVED_varchar1 nvarchar(260),
varchar(260), null
0 = past week
1 = past month
3 = past year
4 = past 24 hours
5 = current month
0 = Unacknowledged
ED = Enforcer Down
VO = Virus outbreak
DF = Server health
SE = System event
UM = Unmanaged computer
FILTERCREATEDBY The GUID of the administrator who created this alert filter. nvarchar(255),
varchar(255), not null
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
0 = not deleted
1 = deleted
58 Alert Filter data table
Alert Filter schema
Chapter 10
Agent Status data table
This chapter includes the following topics:
AGENTTYPE Possible values for AGENTTYPE include the following: varchar(255), not null
SAV 10.x
LogSender
ClientInventory
SAV 11.x
AGENTNAME Name that is associated with this agent. varchar(255), not null
else: blank
LASTRUNGMT Last time this agent ran stored in GMT. varchar(50), not null
MAIL Flag whether email has already been sent. int, not null
1 = Yes
0 = No
LASTRUN_DATA Extra data that is associated with the agent run, if any. nvarchar(255),
varchar(255), null
Chapter 11
Alert Message data table
This chapter includes the following topics:
ALERT ALERT is a hard-coded English string that is used as a lookup varchar(128), not null
It corresponds to an event ID from the Symantec Endpoint
Protection agent.
1 = Virus found
3 is not used
4 is not used
■ Alerts schema
Alerts schema
Table 12-1 describes the database schema for alerts information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ALERTS.
SOURCE A hard-coded English string that is used as a lookup key varchar(50), not null
for the following scan types:
"Scheduled Scan"
"Manual Scan"
"Integrity Shield"
"Definition downloader"
"System"
"Startup Scan"
"DefWatch"
"Manual Quarantine"
"Reboot Processing"
"Heuristic Scan"
NOOFVIRUSES The number of events for the aggregated event record. int, not null
This number can be due to client-side aggregation,
server-side compression, or both.
ACTUALACTION_IDX Pointer to table ACTUALACTION, this is the action int, not null
taken on the risk.
REQUESTEDACTION_IDX Pointer to table ACTUALACTION; this is the action int, not null
requested by the policy.
SECONDARYACTION_IDX Pointer to table ACTUALACTION; this is the secondary int, not null
action requested by the policy.
ALERTINSERTTIME The time at which the event was inserted in to the datetime, not null
database.
Alerts data table 65
Alerts schema
SERVERGROUP_IDX Pointer to table IDENTITY_MAP; this is the Symantec char(32), not null
Endpoint Protection Manager domain GUID.
USER_NAME The name of the user that was logged onto the computer nvarchar(64), varchar(64),
when the event took place. not null
PARENTSERVER_IDX Pointer to table IDENTITY_MAP; this is the Symantec char(32), not null
Endpoint Protection Manager server GUID.
CLIENTGROUP_IDX Pointer to table IDENTITY_MAP; this is the Symantec char(32), not null
Endpoint Protection Manager group GUID.
SOURCE_COMPUTER_NAME The source of the threat. It is logged when threat tracer nvarchar(64), varchar(64),
is enabled in the antivirus and antispyware policy. not null
SOURCE_COMPUTER_IP The source of the threat. It is logged when threat tracer bigint, not null
is enabled in the antivirus and antispyware policy.
MOTHER_IDX Pointer to the related compressed event in the ALERTS char(32), not null
table. This is the compressed event created by database
maintenance. A value here means that this event has
been aggregated server-side and is a child event.
LAST_LOG_SESSION_GUID An ID that is used by the client to keep track of related char(32), not null
threat events.
ALERTENDDATETIME The time at which the event ended. This is the end of datetime, not null
the aggregated event time.
SCAN_ID Pointer to the scan table event that picked up this event. bigint, not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
66 Alerts data table
Alerts schema
0 = not deleted
1 = deleted
Chapter 13
Anomaly Detection data
table
This chapter includes the following topics:
TIME_STAMP The time when this database record was bigint, not null
entered or modified in the database, in
milliseconds since 1970.
0 = not deleted
1 = deleted
Chapter 14
Anomaly Detection
Operation data table
This chapter includes the following topics:
0 = Unknown
1 = Scan
2 = Present
3 = Not Present
4 = Equal
5 = Not Equal
6 = Equal (Case-insensitive)
8 = Scan Memory
Chapter 15
Anomaly Detections data
table
This chapter includes the following topics:
STATUS The scan detection status. Currently always 1 to mean int, not null
"successful detection performed". Other values are
reserved for future use.
LOG_SESSION_GUID The LOG_SESSION_GUID is an ID that the client uses char(32), not null
to keep track of related threat events.
USN A USN-based serial number; this ID is not unique. bigint, not null
72 Anomaly Detections data table
Anomaly Detections schema
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
0 = not deleted
1 = deleted
1000 = Registry
1001 = File
1002 = Process
1005 = Service
1009 = Directory
0 = not deleted
1 = deleted
Chapter 18
Anomaly Remediation
Operation data table
This chapter includes the following topics:
Remediation_Operation_ID,
Remediation_Operation_Desc. A hard-coded
English string that is used for a lookup.
0 = Unknown
1 = Delete
2 = Delete Line
3 = Move
5 = Set
6 = Terminate
7 = Suspend
8 = Stop
9 = Remove
10 = Handle Threat
11 = Set IP Address
13 = Deny Access
999 = Invalid
1001 = Move
1002 = Rename
1003 = Delete
1005 = Clean
1007 = Save As
1011 = Undo
1012 = Bad
80 Anomaly Remediation Operation data table
Anomaly Remediation Operation schema
1013 = Backup
1014 = Pending
1015 = Partial
1016 = Terminate
1017 = Exclude
LOG_SESSION_GUID The ID that the client uses to keep char(32), not null
track of related threat events.
82 Anomaly Remediations data table
Anomaly Remediations schema
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
0 = Not deleted
1 = deleted
2000 = Registry
2001 = File
2002 = Process
2005 = Service
2009 = Directory
STARTDATEFROM The start time for the filter. datetime, not null
STARTDATETO The end time for the filter. datetime, not null
86 Audit Report data table
Audit Report schema
0 = past week
1 = past month
3 = past year
4 = past 24 hours
5 = current month
0 = Policy added
1 = Policy deleted
2 = Policy edited
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
0 = Not deleted
1 = Deleted
88 Audit Report data table
Audit Report schema
Chapter 22
Basic Metadata data table
This chapter includes the following topics:
0 = Deleted
1 = Not deleted
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflict.
TYPE The type name of the schema object. varchar(256), not null
USER_ID The GUID of user who created this char(32), not null
filter.
0 = past week
1 = past month
3 = past year
4 = past 24 hours
5 = current month
1 = Application type
1 = Critical
5 = Major
9 = Minor
13 = Information
0 = Allow
1 = Block
2 = Ask
3 = Continue
4 = Terminate
1 = Yes
0 = No
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
0 = Not deleted
1 = Deleted
Chapter 24
Binary File data table
This chapter includes the following topics:
DELETED The deleted flag of the schema object. tinyint, not null
1 = Deleted
0 = Not Deleted
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflict.
■ Command schema
Command schema
Table 25-1 describes the database schema for command information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_COMMAND.
HARDWARE_KEY* The hash of the computer hardware information. char(32), not null
COMMAND_ID* The GUID of the command object. This GUID corresponded char(32), not null
to the ID in the Basic Metadata table.
DOMAIN_ID The domain ID currently being administered when the char(32), not null
command is created.
USN The update serial number; used by replication. bigint, not null
BEGIN_TIME The time that the command was launched at the client (in bigint, not null
GMT).
LAST_UPDATE_TIME The time of the last status that the client reported (in GMT). bigint, not null
98 Command data table
Command schema
STATE_ID Command status: a numeric value that corresponds to one int, not null
of the following values:
0 = INITIAL
1 = RECEIVED
2 = IN_PROGRESS
3 = COMPLETED
4 = REJECTED
5 = CANCELLED
6 = ERROR
0 = Success
100 = Success
ESTIMATED_DURATION The agent estimation of command duration in minutes. 0 = int, not null
no estimate or negligible time.
PERCENT_COMPLETE Progress (0-100%) of the command that was based on tinyint, not null
estimated duration.
TIME_STAMP The time when the command was added into the database, bigint, not null
in milliseconds since 1970.
DELETED The deleted flag of the schema object: tinyint, not null
1 = Deleted
0 = Not Deleted
RESERVED_BINARY varbinary(1000),
null
100 Command data table
Command schema
Chapter 26
Command Report data table
This chapter includes the following topics:
USER_ID The GUID of user who created this filter. char(32), not null
0 = past week
1 = past month
3 = past year
4 = past 24 hours
5 = current month
0 = Not received
1 = Received
2 = In progress
3 = Completed
4 = Rejected
5 = Canceled
6 = Error
Command Report data table 103
Command Report schema
0 = Success
SORTORDER The column name in the table to sort by. varchar(32), not null
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
USN A USN-based serial number; this ID is not unique. bigint, not null
104 Command Report data table
Command Report schema
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
0 = not deleted
1 = deleted
Chapter 27
Compliance Report data
table
This chapter includes the following topics:
USER_ID The GUID of user who created this filter. char(32), not null
0 = past week
1 = past month
3 = past year
4 = past 24 hours
5 = current month
1 = Enforcer Server
2 = Enforcer Client
3 = Enforcer Traffic
4 = Host Compliance
6 = Device Control
1 = Enforcer registered
0 = Blocked
1 = Not Blocked
1 = Other
2 = TCP
3 = UDP
4 = ICMP
1 = Inbound
2 = Outbound
0 = Unknown
1 = Signature is out-of-date
Authenticated
Disconnected
Passed
Rejected
Failed
0 = Gateway Enforcer
1 = LAN Enforcer
2 = DHCP Enforcer
3 = Integrated Enforcer
4 = NAP Enforcer
5 = Peer-to-Peer Enforcer
Compliance Report data table 111
Compliance Report schema
501 = Windows XP
400 = Windows NT
000 = Other
DESC = Descending
ASC = Ascending
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
0 = Not deleted
1 = Deleted
DOMAIN_ID* The GUID of the domain to which the char(32), not null
agent belongs.
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflict.
DELETED The deleted flag of the schema object. tinyint, not null
1 = Deleted
0 = Not Deleted
AvMan
LuMan
legacy
SEP
116 Data Handler data table
Data Handler schema
.dat
.AgentStatus
.SecurityRisk
.VirusScans
.VirusLogs
.Inventory
AvMan = com.sygate.scm.server.logreader.av.LogHandler
Legacy agentstatus =
com.sygate.scm.server.logreader.av.AgentStatusHandler
Legacy inventory =
com.sygate.scm.server.logreader.av.InventoryHandler
SEP = com.sygate.scm.server.statereader.sep.StateHandler
AvMan = com.sygate.scm.server.statereader.av.StateHandler
LuMan = com.sygate.scm.server.statereader.lu.StateHandler
Chapter 30
Enforcer Client Logs 1 and
2 data tables
This chapter includes the following topics:
USN A USN-based serial number; this ID is not unique. bigint, not null
118 Enforcer Client Logs 1 and 2 data tables
Enforcer Client Logs 1 and 2 schema
SITE_ID The GUID of the site to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
0 = Gateway Enforcer
1 = LAN Enforcer
2 = DHCP Enforcer
3 = Integrated Enforcer
4 = NAP Enforcer
5 = Peer-to-Peer Enforcer
PERIOD The period in seconds before the Enforcer takes action int, null
on the client. Only valid when action is equal to Rejected
and Disconnected. For other actions, this field must be
0.
EXTENDED_INFO nvarchar(1024),
varchar(1024), null
USN A USN-based serial number; this ID is not unique. bigint, not null
122 Enforcer Traffic Logs 1 and 2 data table
Enforcer Traffic Logs 1 and 2 schema
SITE_ID The GUID of the site to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
0 = Gateway Enforcer
1 = LAN Enforcer
2 = DHCP Enforcer
3 = Integrated Enforcer
4 = NAP Enforcer
5 = Peer-to-Peer Enforcer
NETWORK_PROTOCOL The protocol type: Enum (OTHERS = 1; TCP = 2; UDP = tinyint, not null
3; ICMP = 4)
LOCAL_PORT The TCP/UDP port in the local computer (host int, not null
byte-order). It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.
Enforcer Traffic Logs 1 and 2 data table 123
Enforcer Traffic Logs 1 and 2 schema
REMOTE_PORT The TCP/UDP port in the remote computer (host int, not null
byte-order). It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.
TRAFFIC_DIRECTION The direction of the traffic. Enum (unknown = 0; tinyint, not null
inbound = 1; outbound = 2)
0 = blocked
1 = Not blocked.
Note: The values in this table and those in the
AGENT_TRAFFIC_LOG_x tables are different.
TOTAL_BYTES The total length of all packets in the traffic. int, not null
REPETITION The number of attacks. When a hacker launches a mass int, null
attack, it may be damped to one event by the log system.
RESERVED_varchar1 nvarchar(260),
varchar(260), null
USN A USN-based serial number; this ID is not unique. bigint, not null
126 Enforcer System Logs 1 and 2 data tables
Enforcer System Logs 1 and 2 schema
SITE_ID The GUID of the site to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
Enforcer System Logs 1 and 2 data tables 127
Enforcer System Logs 1 and 2 schema
0 = Gateway Enforcer
1 = LAN Enforcer
2 = DHCP Enforcer
3 = Integrated Enforcer
4 = NAP Enforcer
5 = Peer-to-Peer Enforcer
0 = INFO
1 = WARNING
2 = ERROR
3 = FATAL
EVENT_DESC A description of the event. Usually, the first line of the nvarchar(256),
description is treated as “summary". varchar(256), null
130 Enforcer System Logs 1 and 2 data tables
Enforcer System Logs 1 and 2 schema
RESERVED_varchar1 nvarchar(260),
varchar(260), null
USER_ID The GUID of the user who created this char(32), not null
filter.
0 = past week
1 = past month
3 = past year
4 = past 24 hours
5 = current month
1 = Traffic
2 = Packets
1 = Critical
5 = Major
9 = Minor
13 = Info
308 = IP packet
305 = Other
1 = Blocked
0 = Not blocked
1 = Other
2 = TCP
3 = UDP
4 = ICMP
1 = Inbound
2 = Outbound
0 = Unknown
SORTORDER The column in the table to sort by. varchar(32), not null
DESC = Descending
ASC = Ascending
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
0 = Not deleted
1 = Deleted
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
136 GUI Parameters data table
GUI Parameters schema
0 = Not deleted
1 = Deleted
Chapter 35
History data table
This chapter includes the following topics:
■ History schema
History schema
Table 35-1 describes the database schema for history information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_HISTORY.
USER_ID The GUID of the user who created this scheduled char(32), not null
report.
TZ_OFFSET The time zone that is offset from when the int, not null
administrator creates the scheduled report so that data
can be formatted to the administrator's local time.
4 = Client Inventory
11 =Client Migration
A = Audit Report
0 = Policies Used
C = Compliance Report
1 = Compliance Status
9 = Full Report
R = Risk Report
12 = Number of Notifications
13 = Weekly Outbreaks
History Configuration data table 143
History Configuration schema
S = Scan Report
Y = System Report
STARTTIME When to start generating the report; this establishes datetime, not null
its scheduled time within the repeat schedule.
LASTRUN When the report was last generated ( in GMT). bigint, not null
RUNHOURS Repeat schedule for this report in hours, for example: int, not null
1 = Every 1 hour
24 = Every 1 day
DISABLED Specifies whether the scheduled report is disabled or tinyint, not null
not.
0 = No
1 = Yes
144 History Configuration data table
History Configuration schema
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
0 = Not Deleted
1 = Deleted
Chapter 37
Home Page Configuration
data table
This chapter includes the following topics:
USN A USN-based serial number; this ID is not unique. bigint, not null
146 Home Page Configuration data table
Home Page Configuration schema
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
0 = Not Deleted
1 = Deleted
Chapter 38
HPP Alerts data table
This chapter includes the following topics:
0 = No
1 = Yes
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
0 = Not Deleted
1 = Deleted
Chapter 39
HPP Application data table
This chapter includes the following topics:
HASH_TYPE The hash algorithm that was used. tinyint, not null
0 = MD5
1 = SHA-1
2 = SHA-256
2 = Key logger
0 = heuristic
1 = commercial application
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
0 = Not Deleted
1 = Deleted
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
154 Inventory Current Risk data table
Inventory Current Risk schema
0 = Not Deleted
1 = Deleted
Chapter 42
Inventory Current Virus
data table
This chapter includes the following topics:
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
156 Inventory Current Virus data table
Inventory Current Virus schema
0 = Not Deleted
1 = Deleted
Chapter 43
Inventory Report data table
This chapter includes the following topics:
LASTCHECKINTIME The last time of check in with management server. datetime, not null
158 Inventory Report data table
Inventory Report schema
LASTSCANTIME The last time that the computer was scanned. int, null
0 = past week
1 = past month
3 = past year
4 = past 24 hours
5 = current month
RELATIVEDATETYPE The last check in time, if relative filtering was int, not null
used.
0 = past week
1 = past month
3 = past year
4 = past 24 hours
5 = current month
PATTERN_IDX A hard-coded English string that is used as key varchar(255), not null
(filters for Antivirus signature version).
IDS_VERSION The intrusions detection system signature version varchar(64), not null
by which to filter.
1 = online
0 = offline
501 = Windows XP
400 = Windows NT
000 = Other
-1 = No filter (all)
0 = Fail
1 = Success
2 = Pending
3 = Disabled
4 = Ignore
0 = Pass
- 1 = No filter (all)
SORTORDER The column to use to sort for the Computer Status varchar(32), not null
log.
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered bigint, not null
or modified in the database, in milliseconds since
1970.
0 = Not Deleted
1 = Deleted
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflict.
DELETED The deleted flag of the schema object. tinyint, not null
1 = Deleted
0 = Not Deleted
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve merge
conflicts.
DELETED The deleted flag of the schema object. tinyint, not null
0 = Deleted
1 = Not Deleted
LEGACY_AGENT_ID* The agent ID from a version 5.x agent. char(32), not null
Primary Key.
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve merge
conflicts.
DELETED The deleted flag of the schema object. tinyint, not null
1 = Deleted
0 = Not Deleted
DELETED The deleted flag of the schema object. tinyint, not null
0 = Deleted
1 = Not Deleted
101 = SERVER_SYSTEM_LOG
102 = SERVER_ADMIN_LOG
103 = SERVER_POLICY_LOG
104 = SERVER_CLIENT_LOG
105 = SERVER_ENFORCER_LOG
201 = AGENT_SYSTEM_LOG
202 = AGENT_SECURITY_LOG
203 = AGENT_TRAFFIC_LOG
204 = AGENT_PACKET_LOG
205 = AGENT_BEHAVIOR_LOG
301 = ENFORCER_SYSTEM_LOG
302 = ENFORCER_CLIENT_LOG
303 = ENFORCER_TRAFFIC_LOG
TABLE_LIST The name of the tables to switch logs. varchar(250), not null
CURRENT_ROWS The current log count in the log table. int, not null
SCAN_TIME The time when the network scan is bigint, not null
added into the database, in
milliseconds since 1970.
TIME_STAMP The time when the command was bigint, not null
added into the database, in
milliseconds since 1970.
DELETED The deleted flag of the schema object. tinyint, not null
1 = Deleted
0 = Not Deleted
STATUS The scan status code of the client. tinyint, not null
TIME_STAMP The time when the command is added bigint, not null
into the database, in milliseconds
since 1970.
DELETED The deleted flag of the schema object. tinyint, not null
1 = Deleted
0 = Not Deleted
■ Notification schema
Notification schema
Table 51-1 describes the database schema for notification information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_NOTIFICATION.
VO = Risk outbreak
AF = Authentication failure
SE = System event
DF = Server health
UM = Unmanaged computers
ED = Enforcer is down
TZ_OFFSET The time zone when the administrator created the int, not null
notification so that emailed reports can display dates
in the administrator's local time zone.
SOURCE The scan to which this notification applies. A varchar(255), not null
hard-coded English string that is used as key.
% = all
Scheduled Scan
Manual Scan
Heuristic Scan
Console
Definition downloader
System
Startup Scan
Idle Scan
Manual Quarantine
182 Notification data table
Notification schema
% = No filter (all)
1 = Quarantined
3 = Deleted
4 = Left alone
5 = Cleaned
14 = Pending repair
15 = Partially repaired
17 = Excluded
19 = Cleaned by deletion
20 = Access denied
21 = Process terminated
22 = No repair available
98 = Suspicious
NTIMES The number of occurrences that must occur to trigger int, not null
this notification.
XMINUTES The time window in which ntimes events must occur int, not null
to trigger the notification.
LASTRUN The time stamp when this notification was last bigint, not null
analyzed.
TRIGGERED The time when the alert was last triggered. bigint, not null
LASTRUN_DATA Any extra data that is needed to give details in the varchar(50), not null
notification email.
Notification data table 183
Notification schema
CATEGORY The virus category to which this notification applies. varchar(10), not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
0 = Not Deleted
1 = Deleted
DAMPER The minimum quiet time between alerts in minutes; 0 int, not null
means autodamper, which is 60 minutes
ALERTDATETIME The time stamp when the alert was datetime, not null
generated.
MSG The notification alert message text. nvarchar(512), varchar(512), not null
186 Notification Alerts data table
Notification Alerts schema
HYPERLINK The link to the report with details nvarchar(512), varchar(512), not null
about the alert situation.
ACKNOWLEDGED The flag that indicates whether the int, not null
alert has been acknowledged.
ACKNOWLEDGED_TIME The time when the notification was datetime, not null
acknowledged.
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
0 = Not deleted
1 = deleted
Chapter 53
Pattern data table
This chapter includes the following topics:
■ Pattern schema
Pattern schema
Table 53-1 describes the database schema for pattern information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_PATTERN.
DECABI
DEUCE_SIG
ERASER_ENGINE
PTS_CONTENT
PTS_ENGINE
SYKNAPPS_CAL
SYKNAPPS_ENGINE
SYKNAPPS_WHITELIST
PATTERNDATE The date when this content was datetime, not null
released.
REVISION The revision number for this content. int, not null
VERSION The version number for this content. varchar(255), not null
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
0 = Not deleted
1 = Deleted
Chapter 54
Reports data table (not
used)
This chapter includes the following topics:
■ Reports schema
Reports schema
The Reports data table is not used.
Table 54-1 describes the database schema for report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_REPORTS.
SITE_ID The GUID of the site from which the char(32), not null
report was generated.
190 Reports data table (not used)
Reports schema
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve merge
conflicts.
DELETED The deleted flag of the schema object. tinyint, not null
1 = Deleted
0 = Not Deleted
FILTERNAME The user-specified name for this saved filter. nvarchar(255), varchar(255),
not null
0 = past week
1 = past month
3 = past year
4 = past 24 hours
5 = current month
THREATS The number of risks the scan found. int, not null
FILESINFECTED The number of files the scan found. bigint, not null
STATUS The scan status as a hard-coded English key. varchar(32), not null
'I.Computer'
'P.Parentserver'
'G.Clientgroup'
'C.Clientuser'
'S.Servergroup'
'SC.Startdatetime'
'SC.Duration'
'SC.Threats'
desc = Descending
asc = Ascending
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
0 = Not Deleted
1 = Deleted
194 Scan Report data table
Scan Report schema
Chapter 56
Scans data table
This chapter includes the following topics:
■ Scans schema
Scans schema
Table 56-1 describes the database schema for scans information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SCANS.
STARTDATETIME The start time for the scan. datetime, not null
STOPDATETIME The stop time for the scan. datetime, not null
completed = Completed
canceled = Canceled
started = Started
196 Scans data table
Scans schema
CLIENTUSER1 The user who was logged in when the scan nvarchar(64), varchar(64), not null
started.
CLIENTUSER2 The user who was logged in when the scan nvarchar(64), varchar(64), not null
ended.
MESSAGE1 The scan message when scan started. nvarchar(255), varchar(255)not null
MESSAGE2 The scan message when the scan ended. nvarchar(255), varchar(255), not null
THREATS The number of threats that the scan bigint, not null
found.
INFECTED The number of files that the scan found bigint, not null
infected.
TIME_STAMP The time when this database record was bigint, not null
entered or modified in the database, in
milliseconds since 1970.
0 = Not deleted
1 = Deleted
Scans data table 197
Scans schema
■ SE Global schema
SE Global schema
Table 57-1 describes the database schema for the system sequence number.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
No primary key is specified for this table.
TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
0 = Not deleted
1 = Deleted
Chapter 59
SEM Agent data table
This chapter includes the following topics:
264961 = Windows 98 SE
264705 = Windows 98
262145 = Windows 95
206 SEM Agent data table
SEM Agent schema
0 = OS Type Unspecified
PROFILE_SERIAL_NO The current profile serial number of the agent. varchar(64), null
0 = Fail
1 = Success
2 = Pending
3 = Disabled
4 = Ignore
0 = Pass
0 = offline
1 = online
USN The update serial number; used by replication. bigint, not null
TIME_STAMP The time that the database record was modified; used to bigint, not null
resolve merge conflicts.
208 SEM Agent data table
SEM Agent schema
DELETED The deleted flag of the schema object. tinyint, not null
1 = Deleted
0 = Not Deleted
RESERVED_varchar1 nvarchar(260),
varchar(260), null
1 = On
2 = Not installed
0 = Off
0 = Not infected
1 = Infected
SEM Agent data table 209
SEM Agent schema
0 = (Severity 0) Viral
2 = (Severity 2) Malicious
6 = (Severity 6) Spyware
7 = (Severity 7) Trackware
8 = (Severity 8) Dialer
9999 = No detections
LAST_SCAN_TIME The last scan time for this agent (in GMT). bigint, not null
LAST_VIRUS_TIME The last time that a virus was detected on the client bigint, not null
computer (in GMT).
1 = yes
0 = no
210 SEM Agent data table
SEM Agent schema
1 = On
2 = Not installed
0 = Off
1 = On
2 = Not installed
0 = Off
MAJOR_VERSION The Symantec Endpoint Protection version: 11. int, not null
0 = No
1 = Yes
AVMAN = Antivirus
LUMAN = LiveUpdate
TIMEZONE The time zone offset of the client computer. int, not null
1 = On
2 = Not installed
0 = Off
APPLICATION_NAME The name of the learned application. nvarchar(260), varchar(260), not null
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.
DELETED The deleted flag of the schema object. tinyint, not null
1 = Deleted
0 = Not Deleted
CLIENT_ID* The GUID of the client. Primary Key. char(32), not null
POLICY_MODE
COMPUTER_NAME
COMPUTER_DOMAIN_NAME
USER_NAME
USER_DOMAIN_NAME
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.
SEM Client data table 217
SEM Client schema
DELETED The deleted flag of the schema object. tinyint, not null
1 = Deleted
0 = Not Deleted
ACTION ACTION is a hard-coded English key with one of two possible varchar(64), not null
values: "check" or "remediation".
RULE_TYPE RULE_TYPE is a hard-coded English key with one of the varchar(64), not null
following possible values:
antivirus
antispyware
patch
service pack
firewall
custom
as_is_installed
as_is_running
as_signature_ok
av_is_installed
av_is_running
av_signature_ok
file_age_ok
file_date_ok
file_size_ok
file_version_ok
file_download
file_exists
file_checksum_ok
file_execute
fw_is_installed
fw_is_running
patch_is_installed
reg_value_incr
reg_key_exists
reg_value_ok
reg_value_exists
reg_value_set
timestamp_ok
msg_dlg_ok
os_ok
os_lang_ok
file_delete
service_pack_ok
hi_setup
TARGET The target of the criteria. For example, it can be the antivirus nvarchar(256),
product name, the firewall product name, the file name, the varchar(256), not
registry key, the registry value. It can also be the patch null
version, the OS version, the process name, or the service
name.
RESULT RESULT takes one of the following possible values: varchar(64), not null
pass
fail
ignore
error
ERROR ERROR takes one of the following possible values: varchar(128), not
null
unknown = unknown
URL_not_accessible_or_failed_to_create_destination_file
= URL not accessible or failed to create destination file
USN The update serial number; used by replication. bigint, not null
TIME_STAMP The time that the database record was modified; used to bigint, not null
resolve merge conflicts.
DELETED The deleted flag of the schema object. tinyint, not null
1 = Deleted
0 = Not Deleted
Chapter 63
SEM Computer data table
This chapter includes the following topics:
Primary Key.
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.
DELETED The deleted flag of the schema object. tinyint, not null
1 = Deleted
0 = Not Deleted
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.
232 SEM Content data table
SEM Content schema
DELETED The deleted flag of the schema object. tinyint, not null
1 = Deleted
0 = Not Deleted
Chapter 65
SEM Job data table
This chapter includes the following topics:
COMMAND_ID* The GUID of the command object. This GUID char(32), not null
corresponds to the ID in the Basic Metadata table.
USN The update serial number; used by replication. bigint, not null
234 SEM Job data table
SEM Job schema
COMMAND_NAME A hard-coded English string that indicates which varchar(64), not null
command was launched. This string is the same string
that is placed in the XML for pre-defined name.
Reboot = Restart
SOURCE_SITE_ID The GUID of the site from which the command was char(32), not null
generated.
SOURCE_ADMIN_ID The GUID of the administrator who issued the char(32), not null
command.
CREATE_TIME The time that the command was issued at the console bigint, not null
by the administrator.
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
SEM Job data table 235
SEM Job schema
1 = Deleted
0 = Not Deleted
USN A USN-based serial number; this ID is not unique. bigint, not null
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
240 Server Admin Logs data tables
Server Admin Logs 1 and 2 schema
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
SEVERITY Enum (SEVERE, WARNING, INFO, CONFIG, FINE, int, not null
FINER, FINEST).
EVENT_DESC A description of the event. Usually, the first line of the nvarchar(256), varchar(256),
description is treated as “summary". null
MSG_ID The event description ID. Use this ID to load the int, null
localized message. Only used when an exception is
related to this event.
ERROR_CODE ErrorCode can uniquely identify the error in source int, null
code. Used only when an exception is related to this
event.
STACK_TRACE The stack trace of the exception. Used only when an nvarchar(2000),
exception is related to this event. varchar(2000), null
USN A USN-based serial number; this ID is not unique. bigint, not null
246 Server Client Logs data tables
Server Client Logs 1 and 2 schema
DOMAIN_ID The GUID of the domain to which the log belongs. char(32), null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered bigint, not null
or modified in the database, in milliseconds since
1970.
EVENT_ID The unique ID of the client activity event. int, not null
1 = Registration succeeded
2 = Registration failed
3 = Client reconnected
4 = Client disconnected
5 = Downloaded policy
7 = Downloaded sylink.xml
22 = Downloaded command
USN A USN-based serial number; this ID is not unique. bigint, not null
250 Server Enforcer Logs data tables
Server Enforcer Logs 1 and 2 schema
SITE_ID The GUID of the site to which the log belongs. char(32), not null
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
Server Enforcer Logs data tables 251
Server Enforcer Logs 1 and 2 schema
USN A USN-based serial number; this ID is not unique. bigint, not null
DOMAIN_ID The GUID of the domain which was administered. char(32), null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
256 Server Policy Logs data tables
Server Policy Logs 1 and 2 schema
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered bigint, not null
or modified in the database, in milliseconds since
1970.
0 = Policy added
1 = Policy deleted
2 = Policy edited
ADMIN_ID The GUID of the administrator who modified the char(32), not null
policy.
EVENT_DESC A description of the event. Usually, the first line nvarchar(512), null
of the description is treated as “summary".
USN A USN-based serial number; this ID is not unique. bigint, not null
SITE_ID The GUID of the site to which the log belongs. char(32), not null
258 Server System Logs data tables
Server System Logs 1 and 2 schema
SERVER_ID The GUID of the server to which the log belongs. char(32), not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
SEVERITY Enum (SEVERE, WARNING, INFO, CONFIG, FINE, int, not null
FINER, FINEST):
MSG_ID The event description ID. Use this ID to load a localized int, null
message. Only used when an exception is related to
this event.
ERROR_CODE ErrorCode can unique identify the error in source code. int, null
Only used when an exception is related to this event.
RESERVED_varchar1 nvarchar(260),
varchar(260), null
Server System Logs data tables 259
Server System Logs 1 and 2 schema
USER_ID The ID of the administrator who created this filter. Foreign char(32), not null
key to user_id column in the Admin User table.
FILTERNAME The filter name that the administrator provided during the nvarchar(255),
save filter operation. varchar(255), not null
0 = past week
1 = past month
3 = past year
4 = past 24 hours
5 = current month
1 = Administrative
3 = Server activity
4 = Client activity
5 = Enforcer Activity
SEVERITY For Administrative, Client-Server, and Server Activity logs, int, null
possible values are as follows:
-1 = No filter (all)
3 = Fatal
-1 = No filter (all)
System Report data table 263
System Report schema
For the Administrative System log. For this log type, this
field stores the value on the left of the = sign, for example,
'ADMIN_ADMIN_TYPES'. It is a hard-coded English string
key. To the right of the = sign are the events that are queried
when the user selects the group.
4099 = Logout
For the Client-Server Activity System log. For this log type,
this field stores the event ID to query.
1 = Registration succeeded
2 = Registration failed
3 = Client reconnected
4 = Client disconnected
5 = Downloaded policy
7 = Downloaded sylink.xml
22 = Downloaded command
For Server Activity System log. For this log type, this field
stores the hard-coded English string key that is located to
the left of the = sign. To the right are listed the events that
are queried for by the group.
SERVER_REPLICATION_EVENT_TYPES = Replication
events.
For the Client Activity System log. For this log, this field
stores the hard-coded English string key that is located to
the left of the = sign. To the right are listed the events that
are queried by the group. The event IDs are in hex.
AGENT_SYSTEM_INSTALL_EVENT_TYPES = Installation
events.
0x12071039 = Uninstall
AGENT_SYSTEM_CONFIG_EVENT_TYPES = Configuration
events.
AGENT_SYSTEM_SECURITY_EVENT_TYPES = Security
events.
For the Enforcer Activity System log. For this log, this field
stores the hard-coded English string key that is located to
the left of the = sign. To the right are listed the events that
are queried by the group. The event IDs are in hex.
ENFORCER_POLICY_MANAGER_EVENT_TY = Management
events.
EVENT_DESC nvarchar(255),
varchar(255), not null
278 System Report data table
System Report schema
ERR_NONE = None
ERR_NONE = None
0 = Gateway Enforcer
1 = LAN Enforcer
2 = DHCP Enforcer
3 = Integrated Enforcer
4 = NAP Enforcer
5 = Peer-to-Peer Enforcer
SORTORDER The column on which to sort for log views. varchar(32), not null
Desc = Descending
Asc = Ascending
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
DELETED The deleted flag of the schema object. tinyint, not null
0 = Deleted
1 = Not Deleted
282 System Report data table
System Report schema
Chapter 73
System State data table
This chapter includes the following topics:
TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.
284 System State data table
System State schema
TYPE The type name of the schema object. varchar(256), not null
0 = past week
1 = past month
3 = past year
4 = past 24 hours
5 = current month
1 = Risk
EVENTTYPE The possibilities here are in the ALERTMSG table. varchar(32), not null
ACTUALACTION The possibilities here are in the ACTUALACTION varchar(32), not null
table.
Scheduled Scan
Manual Scan
Heuristic Scan
Console
Definition downloader
System
Startup Scan
Idle Scan
Manual Quarantine
SORTORDER The column to use for the log view sort. varchar(32), not null
SERVERGROUPINCLUDE Whether to include (1) or exclude (0) the domains int, not null
in the list. Always set to 1.
CLIENTGROUPINCLUDE Whether to include (1) or exclude (0) the client int, not null
groups in the list. Always set to 1.
PARENTSERVERINCLUDE Whether to include (1) or exclude (0) the servers in int, not null
the list. (Always set to 1.)
COMPUTERINCLUDE Whether to include (1) or exclude (0) the computers int, not null
in the list. (Always set to 1.)
IPADDRESSINCLUDE Whether to include (1) or exclude (0) the IP int, not null
addresses in the list. (Always set to 1.)
CLIENTUSERINCLUDE Whether to include (1) or exclude (0) the users in int, not null
the list. (Always set to 1.)
THREATINCLUDE Whether to include (1) or exclude (0) the risks in int, not null
the list. (Always set to 1.)
THREATTYPELIST The possibilities here are in the VIRUSCATEGORY varchar(255), not null
table. It is no longer a list but a single item.
THREATTYPEINCLUDE Whether to include (1) or exclude (0) the risk types int, not null
in the list Always set to 1.
= -1 = Unknown
LIMITROWS The number of rows to use for pagination. int, not null
USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
0 = Not deleted
1 = Deleted
Threat Report data table 289
Threat Report schema
■ Version schema
Version schema
Table 75-1 describes the database schema for version information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_VERSION.
■ Virus schema
Virus schema
Table 76-1 describes the database schema for virus information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_VIRUS.
CATEGORY The current category (as downloaded from int, not null
Symantec's Web site ). Values are 1 through 5,
where 1 is very low and 5 is very severe. A value
of -1 means unknown or not applicable. This
rating applies only to viral threats.
294 Virus data table
Virus schema
MAXCATEGORY The maximum category that the virus has int, not null
reached. Values are 1 through 5. A value of -1
means unknown or not applicable. This rating
applies only to viral threats.
0 = Viral
1 = Non-Viral malicious
2 = Malicious
3 = Antivirus - Heuristic
4 = Security risk
5 = Hack tool
6 = Spyware
7 = Trackware
8 = Dialer
9 = Remote access
10 = Adware
11 = Jokeware
12 = Client compliancy
15 = Cookie
Virus data table 295
Virus schema
0 = Boot virus
1 = File virus
2 = Mutation virus
3 = Macro virus
4 = File virus
5 = File virus
6 = Memory virus
7 = Memory OS virus
11 = Virus behavior
12 = Virus behavior
13 = Compressed file
14 = Heuristic
DISCOVERED When Symantec first discovered the threat (as datetime, not null
downloaded from Symantec's Web site ).
VID The unique identifier for a virus that Security bigint, not null
Response sets.
USN A USN-based serial number; this ID is not unique. bigint, not null
TIME_STAMP The time when this database record was entered bigint, not null
or modified in the database, in milliseconds since
1970.
0 = Not deleted
1 = deleted
PATTERN_IDX Pointer to the Pattern table that protects against char(32), not null
this threat.
296 Virus data table
Virus schema
1 = top threat
1 = latest threat
0 = No rating
1,2 = Low
3 = Medium
4> = High
REMOVAL Skill level that is required to remove the threat int, not null
from a given computer.
0 = No rating
1, 2 = Low
3 = Medium
4 >= High
PERFORMANCE Measures the negative impact that the presence int, not null
of a security risk has on the computer's
performance.
0= No rating
1,2= Low
3= Medium
4>= High
PRIVACY The level of privacy that is lost due to the int, not null
presence of a security risk on a computer.
0= No rating
1, 2 = Low
3 = Medium
4 >= High
DEPENDENCY The number of dependent components that the int, not null
risk installs.
0 = No rating
1, 2 = Low
3 = Medium
4 >= High
OVERALL An average of all the security risk ratings. This int, not null
rating applies only to non-viral threats.
298 Virus data table
Virus schema
Chapter 77
Virus Category data table
This chapter includes the following topics:
0 = Viral
1 = Non-Viral malicious
2 = Malicious
3 = Heuristic
4 is no longer used
5 = Hack tool
6 = Spyware
7 = Trackware
8 = Dialer
9 = Remote access
10 = Adware
11 = Jokeware
12 = Client compliancy
14 = ApplicationHeuristic
15 = Cookie
Chapter 78
Database Schema Views
This chapter includes the following topics:
■ Purposes of views
Purposes of views
The database contains a number of views to enable you to look at the tables in
different ways. The view names begin with the letter V to distinguish them from
the tables. The following table lists these views and the purpose of each.
View Purpose
View Purpose