0% found this document useful (0 votes)
48 views

Schema Reference Guide

Uploaded by

rishshris
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views

Schema Reference Guide

Uploaded by

rishshris
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 302

Symantec™ Endpoint

Protection Manager
Database Schema Reference

For Symantec Endpoint Protection and


Symantec Network Access Control
Symantec™ Endpoint Protection Manager Database
Schema Reference
The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.

Documentation version 11.00.02.00.00

Legal Notice
Copyright © 2008 Symantec Corporation. All rights reserved.

Symantec, the Symantec Logo, LiveUpdate, Sygate, Symantec AntiVirus, Bloodhound,


Confidence Online, Digital Immune System, Norton, and TruScan are trademarks or
registered trademarks of Symantec Corporation or its affiliates in the U.S. and other
countries. Other names may be trademarks of their respective owners.

This Symantec product may contain third party software for which Symantec is required
to provide attribution to the third party (“Third Party Programs”). Some of the Third Party
Programs are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under
those open source or free software licenses. Please see the Third Party Legal Notice Appendix
to this Documentation or TPIP ReadMe File accompanying this Symantec product for more
information on the Third Party Programs.

The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
20330 Stevens Creek Blvd.
Cupertino, CA 95014

http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical
Support’s primary role is to respond to specific queries about product features
and functionality. The Technical Support group also creates content for our online
Knowledge Base. The Technical Support group works collaboratively with the
other functional areas within Symantec to answer your questions in a timely
fashion. For example, the Technical Support group works with Product Engineering
and Symantec Security Response to provide alerting services and virus definition
updates.
Symantec’s maintenance offerings include the following:
■ A range of support options that give you the flexibility to select the right
amount of service for any size organization
■ Telephone and Web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade assurance that delivers automatic software upgrade protection
■ Global support that is available 24 hours a day, 7 days a week
■ Advanced features, including Account Management Services
For information about Symantec’s Maintenance Programs, you can visit our Web
site at the following URL:
www.symantec.com/techsupp/

Contacting Technical Support


Customers with a current maintenance agreement may access Technical Support
information at the following URL:
www.symantec.com/techsupp/
Before contacting Technical Support, make sure you have satisfied the system
requirements that are listed in your product documentation. Also, you should be
at the computer on which the problem occurred, in case it is necessary to replicate
the problem.
When you contact Technical Support, please have the following information
available:
■ Product release level
■ Hardware information
■ Available memory, disk space, and NIC information
■ Operating system
■ Version and patch level
■ Network topology
■ Router, gateway, and IP address information
■ Problem description:
■ Error messages and log files
■ Troubleshooting that was performed before contacting Symantec
■ Recent software configuration changes and network changes

Licensing and registration


If your Symantec product requires registration or a license key, access our technical
support Web page at the following URL:
www.symantec.com/techsupp/

Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Customer Service is available to assist with the following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and maintenance contracts
■ Information about the Symantec Buying Programs
■ Advice about Symantec's technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs or manuals
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement,
please contact the maintenance agreement administration team for your region
as follows:

Asia-Pacific and Japan [email protected]

Europe, Middle-East, and Africa [email protected]

North America and Latin America [email protected]

Additional enterprise services


Symantec offers a comprehensive set of services that allow you to maximize your
investment in Symantec products and to develop your knowledge, expertise, and
global insight, which enable you to manage your business risks proactively.
Enterprise services that are available include the following:

Symantec Early Warning Solutions These solutions provide early warning of cyber attacks, comprehensive threat
analysis, and countermeasures to prevent attacks before they occur.

Managed Security Services These services remove the burden of managing and monitoring security devices
and events, ensuring rapid response to real threats.

Consulting Services Symantec Consulting Services provide on-site technical expertise from
Symantec and its trusted partners. Symantec Consulting Services offer a variety
of prepackaged and customizable options that include assessment, design,
implementation, monitoring, and management capabilities. Each is focused on
establishing and maintaining the integrity and availability of your IT resources.

Educational Services Educational Services provide a full array of technical training, security
education, security certification, and awareness communication programs.

To access more information about Enterprise services, please visit our Web site
at the following URL:
www.symantec.com
Select your country or language from the site index.
Contents

Technical Support ............................................................................................... 4


Chapter 1 Database schema overview ............................................... 15
About the Symantec Endpoint Protection Manager database
schema ................................................................................. 15

Chapter 2 Actual Action data table .................................................... 17


Actual Action schema .................................................................... 17

Chapter 3 Admin User data table ....................................................... 21


Admin User schema ...................................................................... 21

Chapter 4 Agent Behavior Logs data table ....................................... 23


Agent Behavior Logs schema .......................................................... 23

Chapter 5 Agent Packet Logs data table ........................................... 29


Agent Packet Logs schema ............................................................. 29

Chapter 6 Agent Security Logs data table ........................................ 33


Agent Security Logs schema ........................................................... 33

Chapter 7 Agent System Logs data table .......................................... 39


Agent System Logs schema ............................................................ 39

Chapter 8 Agent Traffic Logs data table ............................................ 49


Agent Traffic Logs schema ............................................................. 49

Chapter 9 Alert Filter data table ......................................................... 55


Alert Filter schema ....................................................................... 55
8 Contents

Chapter 10 Agent Status data table ..................................................... 59


Agent Status schema .................................................................... 59

Chapter 11 Alert Message data table ................................................... 61


Alert Message schema ................................................................... 61

Chapter 12 Alerts data table .................................................................. 63


Alerts schema .............................................................................. 63

Chapter 13 Anomaly Detection data table .......................................... 67


Anomaly Detection schema ............................................................ 67

Chapter 14 Anomaly Detection Operation data table ....................... 69


Anomaly Detection Operation schema .............................................. 69

Chapter 15 Anomaly Detections data table ........................................ 71


Anomaly Detections schema ........................................................... 71

Chapter 16 Anomaly Detection Type data table ................................. 73


Anomaly Detection Type schema ..................................................... 73

Chapter 17 Anomaly Remediation data table ..................................... 75


Anomaly Remediation schema ........................................................ 75

Chapter 18 Anomaly Remediation Operation data table ................. 77


Anomaly Remediation Operation schema .......................................... 77

Chapter 19 Anomaly Remediations data table ................................... 81


Anomaly Remediations schema ...................................................... 81

Chapter 20 Anomaly Remediation Type data table ........................... 83


Anomaly Remediation Type schema ................................................. 83

Chapter 21 Audit Report data table ...................................................... 85


Audit Report schema .................................................................... 85
Contents 9

Chapter 22 Basic Metadata data table ................................................. 89


Basic Metadata schema ................................................................. 89

Chapter 23 Behavior Report data table ............................................... 91


Behavior Report schema ................................................................ 91

Chapter 24 Binary File data table ......................................................... 95


Binary File schema ....................................................................... 95

Chapter 25 Command data table .......................................................... 97


Command schema ........................................................................ 97

Chapter 26 Command Report data table ........................................... 101


Command Report schema ............................................................. 101

Chapter 27 Compliance Report data table ........................................ 105


Compliance Report schema .......................................................... 105

Chapter 28 Computer Application data table ................................... 113


Computer Application schema ...................................................... 113

Chapter 29 Data Handler data table ................................................... 115


Data Handler schema .................................................................. 115

Chapter 30 Enforcer Client Logs 1 and 2 data tables ..................... 117


Enforcer Client Logs 1 and 2 schema .............................................. 117

Chapter 31 Enforcer Traffic Logs 1 and 2 data table ...................... 121


Enforcer Traffic Logs 1 and 2 schema ............................................. 121

Chapter 32 Enforcer System Logs 1 and 2 data tables ................... 125


Enforcer System Logs 1 and 2 schema ............................................. 125

Chapter 33 Firewall Report data table ............................................... 131


Firewall Report schema ................................................................ 131
10 Contents

Chapter 34 GUI Parameters data table .............................................. 135


GUI Parameters schema ............................................................... 135

Chapter 35 History data table .............................................................. 137


History schema .......................................................................... 137

Chapter 36 History Configuration data table .................................... 139


History Configuration schema ....................................................... 139

Chapter 37 Home Page Configuration data table ............................ 145


Home Page Configuration schema .................................................. 145

Chapter 38 HPP Alerts data table ........................................................ 147


HPP Alerts schema ..................................................................... 147

Chapter 39 HPP Application data table ............................................. 149


HPP Application schema .............................................................. 149

Chapter 40 Identity Map data table .................................................... 151


Identity Map schema ................................................................... 151

Chapter 41 Inventory Current Risk data table .................................. 153


Inventory Current Risk schema ..................................................... 153

Chapter 42 Inventory Current Virus data table ................................ 155


Inventory Current Virus schema .................................................... 155

Chapter 43 Inventory Report data table ............................................ 157


Inventory Report schema ............................................................. 157

Chapter 44 LAN Device Detected data table ..................................... 163


LAN Device Detected schema ........................................................ 163

Chapter 45 LAN Device Excluded data table ..................................... 165


LAN Device Excluded schema ........................................................ 165
Contents 11

Chapter 46 Legacy Agent data table ................................................... 167


Legacy Agent schema .................................................................. 167

Chapter 47 Local Metadata data table ............................................... 169


Local Metadata schema ................................................................ 169

Chapter 48 Log Configuration data table .......................................... 171


Log Configuration schema ............................................................ 171

Chapter 49 Network Scan data table .................................................. 175


Network Scan schema .................................................................. 175

Chapter 50 Network Scan Result data table ..................................... 177


Network Scan Result schema ........................................................ 177

Chapter 51 Notification data table ...................................................... 179


Notification schema .................................................................... 179

Chapter 52 Notification Alerts data table .......................................... 185


Notification Alerts schema ........................................................... 185

Chapter 53 Pattern data table .............................................................. 187


Pattern schema .......................................................................... 187

Chapter 54 Reports data table (not used) ......................................... 189


Reports schema .......................................................................... 189

Chapter 55 Scan Report data table ..................................................... 191


Scan Report schema .................................................................... 191

Chapter 56 Scans data table ................................................................ 195


Scans schema ............................................................................ 195

Chapter 57 SE Global data table .......................................................... 199


SE Global schema ....................................................................... 199
12 Contents

Chapter 58 SCF Inventory data table (not used) .............................. 201


SCF Inventory schema ................................................................. 201

Chapter 59 SEM Agent data table ....................................................... 203


SEM Agent schema ..................................................................... 203

Chapter 60 SEM Application data table ............................................. 213


SEM Application schema .............................................................. 213

Chapter 61 SEM Client data table ....................................................... 215


SEM Client schema ..................................................................... 215

Chapter 62 SEM Compliance Criteria data table ............................. 219


SEM Compliance Criteria schema .................................................. 219

Chapter 63 SEM Computer data table ................................................ 227


SEM Computer schema ................................................................ 227

Chapter 64 SEM Content data table ................................................... 231


SEM Content schema ................................................................... 231

Chapter 65 SEM Job data table ........................................................... 233


SEM Job schema ......................................................................... 233

Chapter 66 Serial Numbers data table ............................................... 237


Serial Numbers schema ............................................................... 237

Chapter 67 Server Admin Logs data tables ....................................... 239


Server Admin Logs 1 and 2 schema ................................................ 239

Chapter 68 Server Client Logs data tables ........................................ 245


Server Client Logs 1 and 2 schema ................................................. 245

Chapter 69 Server Enforcer Logs data tables ................................... 249


Server Enforcer Logs 1 and 2 schema .............................................. 249
Contents 13

Chapter 70 Server Policy Logs data tables ........................................ 255


Server Policy Logs 1 and 2 schema ................................................. 255

Chapter 71 Server System Logs data tables ..................................... 257


Server System Logs 1 and 2 schema ............................................... 257

Chapter 72 System Report data table ................................................ 261


System Report schema ................................................................ 261

Chapter 73 System State data table ................................................... 283


System State schema ................................................................... 283

Chapter 74 Threat Report data table .................................................. 285


Threat Report schema ................................................................. 285

Chapter 75 Version data table ............................................................. 291


Version schema .......................................................................... 291

Chapter 76 Virus data table .................................................................. 293


Virus schema ............................................................................. 293

Chapter 77 Virus Category data table ................................................ 299


Virus Category schema ................................................................ 299

Chapter 78 Database Schema Views .................................................. 301


Purposes of views ....................................................................... 301
14 Contents
Chapter 1
Database schema overview
This chapter includes the following topics:

■ About the Symantec Endpoint Protection Manager database schema

About the Symantec Endpoint Protection Manager


database schema
The Symantec Endpoint Protection Manager database stores all the information
that concerns the Symantec software and associated security information. The
information is stored in a series of tables, the database schema.
Data types represent the physical make up of the data.
The following types of data are used in the database:
■ bigint
■ char
■ datetime
■ int
■ nvarchar
■ tinyint
■ varbinary
■ varchar
Some data types include the physical length of the field in parentheses. For
example, char(24) indicates a character field with a length of 24 characters.
An asterisk (*) beside a field name indicates that the field acts as a Primary Key
in the tables. The Primary Key is a column or a set of columns that uniquely
identify all the rows in a table. Primary Keys may not contain null values. No two
16 Database schema overview
About the Symantec Endpoint Protection Manager database schema

rows can have the same Primary Key value; therefore, a Primary Key value always
uniquely identifies a single row. More than one key can uniquely identify rows in
a table, each of these keys is called a Candidate Key. Only one candidate can be
chosen as the Primary Key of a table; all other Candidate Keys are known as
Alternate Keys.
In a normalized table, all of a row's data values depend completely on the Primary
Key. For example, in a normalized employee table with EmployeeID as the Primary
Key, all columns should contain data that is related to a specific employee. The
table should not have a DepartmentName column because the name of the
department depends on a Department ID, not on an Employee ID.
Chapter 2
Actual Action data table
This chapter includes the following topics:

■ Actual Action schema

Actual Action schema


If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ACTUALACTION.

Table 2-1 Actual Action schema

Database Field Name Comment Data Type

ACTUALACTION_IDX* Primary Key (one of 1…500 as shown) int, not null


18 Actual Action data table
Actual Action schema

Table 2-1 Actual Action schema (continued)

Database Field Name Comment Data Type

ACTUALACTION varchar(255), not


null
Actual Action data table 19
Actual Action schema

Table 2-1 Actual Action schema (continued)

Database Field Name Comment Data Type

A hard-coded English string that was used for the following


lookups:

-1 = Action invalid

1 = Quarantined

2 = Renamed

3 = Deleted

4 = Left alone

5 = Cleaned

6 = Cleaned or macros deleted

7 = Saved

9 = Moved back

10 = Renamed back

11 = Undone

12 = Bad

13 = Backed up

14 = Pending repair

15 = Partially repaired

16 = Process termination pending restart

17 = Excluded

18 = Restart processing

19 = Cleaned by deletion

20 = Access denied

21 = Process terminated

22 = No repair available

23 = All actions failed

98 = Suspicious

99 = Details pending

110 = Detected by using the commercial application list

111 = Forced detection by using the file name

1000 = Forced detection by using the file hash


20 Actual Action data table
Actual Action schema

Table 2-1 Actual Action schema (continued)

Database Field Name Comment Data Type

500 = Not applicable


Chapter 3
Admin User data table
This chapter includes the following topics:

■ Admin User schema

Admin User schema


If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ADMINUSER.

Table 3-1 Admin User schema

Database Field Name Comment Data Type

USER_ID* Primary Key, Logon user ID. char(32), not null

USER_NAME The user name of the admin. nvarchar(255),


varchar(255), not null

DOMAIN_ID The GUID for the currently logged in domain. char(32), not null

AUTOREFRESH The user-defined auto refresh value for all logs (computer int, not null
status, notifications, scan, and so on).

LASTCHANGE The last time that the user accessed the console. int, not null

LASTSPMTIME The last time of a successful keep alive to application server. int, not null
22 Admin User data table
Admin User schema
Chapter 4
Agent Behavior Logs data
table
This chapter includes the following topics:

■ Agent Behavior Logs schema

Agent Behavior Logs schema


The Agent Behavior Logs data table is not used in Symantec Network Access
Control.
Table 4-1 describes the database schema for the Agent Behavior logs.
This schema has two tables. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_AGENT_BEHAVIOR_LOG_1_LOG_IDX or
I_AGENT_BEHAVIOR_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.
24 Agent Behavior Logs data table
Agent Behavior Logs schema

Table 4-1 Agent Behavior Logs 1 and 2 schema

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null

DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null

SITE_ID The GUID of the site to which the log belongs. char(32), not null

SERVER_ID The GUID of the server to which the log belongs. char(32), not null

GROUP_ID The GUID of the group to which the log belongs. char(32), not null

COMPUTER_ID The GUID of the client computer that is associated char(32), not null
with the agent log.

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.

EVENT_ID An event ID from the Symantec Endpoint Protection int, not null
agent.

Possible values are as follows:

501 = Application Control Driver

502 = Application Control Rules

999 = Tamper Protection

EVENT_TIME The event-generated time (in GMT). bigint, not null

SEVERITY The seriousness of the event. int, not null

0 is most serious.

AGENT_ID The GUID of the agent. char(32), null

HARDWARE_KEY The hash of the computer hardware information. char(32), null

HOST_NAME The host name of client computer. nvarchar(256),


varchar(256), null

ACTION Possible values include the following: int, null

0 = allow

1 = block

2 = ask

3 = continue

4 = terminate
Agent Behavior Logs data table 25
Agent Behavior Logs schema

Table 4-1 Agent Behavior Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

TEST_MODE Was this rule run in test mode? int, null

0 = No, Else = Yes

DESCRIPTION The behavior that was blocked. nvarchar(256),


varchar(256), null

VAPI_NAME The API that was blocked. nvarchar(256),


varchar(256), null

ENCODED_API_NAME nvarchar(256),
varchar(256), null

BEGIN_TIME The start time of the security issue. bigint, null

END_TIME The end time of the security issue. End time is an bigint, null
optional field because Symantec may fail to detect the
exact end time of traffic, like UDP. In those cases, the
end time is equal to start time.

RULE_ID The ID of the rule that the event triggered. It is always char(32), null
0 if the rule ID is not specified in the security rule. The
field is helpful to security rule troubleshooting. If
multiple rules match, RULE_ID logs the rule that has
final decision on PacketProc (pass/block/drop).

RULE_NAME The name of the rule that the event triggered. It is nvarchar(256),
always an empty string if the rule name is not specified varchar(256), null
in the security rule. It is also used for troubleshooting.
In theory, the IT admin can know the rule by ID.
However, the name gives the user a direct view of the
rule that can be used.

CALLER_PROCESS_ID The ID of the process that triggers the logging. bigint, null

CALLER_PROCESS_NAME The full path name of the application that is involved. nvarchar(256),
It may be empty if the application is unknown, if the varchar(256), null
operating system is involved, or if no application is
involved. Also, it may be empty if the profile says “don’t
log the application name in the raw traffic log.”

CALLER_RETURN_ADDRESS The return address of the caller. This field allows the bigint, null
software to detect the calling module that makes the
API call.
26 Agent Behavior Logs data table
Agent Behavior Logs schema

Table 4-1 Agent Behavior Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

CALLER_RETURN_MODULE_NAME The module name of the caller. See the nvarchar(256),


“CallerReturnAddress” field for more information. varchar(256), null

PARAMETER The parameters that were used in the API call. Each nvarchar(256),
parameter was converted to STRING format and varchar(256), null
separated by one space character. Double quotation
characters within the string are escaped by a backslash
(\) character.

ALERT ALERT indicates whether this event is counted during int, null
alert notification processing at the server. ALERT is
true if Tamper Protection logs the event. It is false
otherwise.

Possible values are as follows:

True = 1

False = 0

SEND_SNMP_TRAP SEND_SNMP_TRAP reflects the send SNMP trap action. tinyint, null
SEND_SNMP_TRAP is true if send is true.

USER_NAME The logon user name. nvarchar(256),


varchar(256), null

DOMAIN_NAME The logon (Windows) domain name. nvarchar(256),


varchar(256), null

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260),
varchar(260), null

RESERVED_BINARY varbinary(2000),
null

REPETITION Event repetition due to aggregation (damper). int, not null


Agent Behavior Logs data table 27
Agent Behavior Logs schema

Table 4-1 Agent Behavior Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

LOG_IDX* The log index unique ID. char(32), null


28 Agent Behavior Logs data table
Agent Behavior Logs schema
Chapter 5
Agent Packet Logs data
table
This chapter includes the following topics:

■ Agent Packet Logs schema

Agent Packet Logs schema


The Agent Packet Logs data table is not used in Symantec Network Access Control.
Table 5-1 describes the database schema for the Agent Packet logs.
This schema has two tables. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_AGENT_PACKET_LOG_1_LOG_IDX or
I_AGENT_PACKET_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.
30 Agent Packet Logs data table
Agent Packet Logs schema

Table 5-1 Agent Packet Logs 1 and 2 schema

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null

DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null

SITE_ID The GUID of the site to which the log belongs. char(32), not null

SERVER_ID The GUID of the server to which the log belongs. char(32), not null

GROUP_ID The GUID of the group to which the log belongs. char(32), not null

COMPUTER_ID The GUID of the client computer that is associated with the char(32), not null
agent packet log.

TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.

EVENT_ID An event ID from the Symantec Endpoint Protection agent. int, not null

401 = Raw Ethernet

EVENT_TIME The event-generated time (in GMT). bigint, not null

AGENT_ID The GUID of the agent. char(32), null

HARDWARE_KEY The hash of the computer hardware information. char(32), null

HOST_NAME The host name of the client computer. nvarchar(256),


varchar(256), null

LOCAL_HOST_IP The IP address of the local computer (IPv4). bigint, null

REMOTE_HOST_IP The IP address of the remote computer (IPv4). bigint, null

REMOTE_HOST_NAME The name of the remote computer. It may be empty if the nvarchar(64), varchar(64),
name resolution failed. null

LOCAL_PORT The TCP/UDP port in local computer (host byte-order). It is int, null
valid only on TSE_TRAFFIC_TCP and TSE_TRAFFIC_UDP.
Otherwise, it is always zero.

REMOTE_PORT The TCP/UDP port in remote computer (host byte-order). int, null
It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.

TRAFFIC_DIRECTION The direction of traffic. Enum (unknown = 0; inbound = 1; tinyint, null


outbound = 2)
Agent Packet Logs data table 31
Agent Packet Logs schema

Table 5-1 Agent Packet Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

BLOCKED Whether the traffic was blocked. tinyint, not null

Possible values are as follows:

Yes = 1

No = 0

APP_NAME The full path name of the application involved. It may be nvarchar(256),
empty if an unknown application is involved or if no varchar(256), null
application is involved. For example, the ping of death
denial-of-service attack doesn’t have an AppName because
it attacks the operating system.

ALERT ALERT reflects the alert attribute in the profile action. If int, null
the Network Threat Protection policy indicates that the
event should be considered for server-side notification
generation, the ALERT field is set to 1.

Possible values are as follows:

Yes = 1

No = 0

SEND_SNMP_TRAP SEND_SNMP_TRAP reflects the send SNMP trap action. tinyint, null
SEND_SNMP_TRAP is true if send is true.

Possible values are as follows:

Yes = 1

No = 0

EVENT_DATA Additional data in binary format. This field is optional. varbinary(2000), null

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260),
varchar(260), null
32 Agent Packet Logs data table
Agent Packet Logs schema

Table 5-1 Agent Packet Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

RESERVED_BINARY varbinary(2000), null

LOG_IDX* The log index unique ID. char(32), null


Chapter 6
Agent Security Logs data
table
This chapter includes the following topics:

■ Agent Security Logs schema

Agent Security Logs schema


Table 6-1 describes the database schema for the Agent Security logs.
This schema has two tables. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_AGENT_SECURITY_LOG_1_AGENT_SECURITY_LOG_IDX or
I_AGENT_SECURITY_LOG_2_AGENT_SECURITY_LOG_IDX. The
AGENT_SECURITY_LOG_IDX field serves as the table's unique identifier, but it
is not formally classified as the table's primary key. This field has an index on it,
but it is not the primary key index. This table has no primary key.

Table 6-1 Agent Security Logs 1 and 2 schema

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null
34 Agent Security Logs data table
Agent Security Logs schema

Table 6-1 Agent Security Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null

SITE_ID The GUID of the site to which the log belongs. char(32), not null

SERVER_ID The GUID of the server to which the log belongs. char(32), not null

GROUP_ID The GUID of the group to which the log belongs. char(32), not null

COMPUTER_ID The GUID of the client computer that is associated with char(32), not null
the agent security log.

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
Agent Security Logs data table 35
Agent Security Logs schema

Table 6-1 Agent Security Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

EVENT_ID Compliance events: int, not null

209 = Host Integrity failed (TSLOG_SEC_NO_AV)

210 = Host Integrity passed (TSLOG_SEC_AV)

221 = Host Integrity failed but it was reported as PASS

237 = Host Integrity custom log entry

Firewall and IPS events:

207 = Active Response

211 = Active Response Disengaged

219 = Active Response Canceled

205 = Executable file changed

216 = Executable file change detected

217 = Executable file change accepted

218 = Executable file change denied

220 = Application Hijacking

201 = Invalid traffic by rule

202 = Port Scan

203 = Denial-of-service attack

204 = Trojan horse

206 = Intrusion Prevention System (Intrusion Detected,


TSLOG_SEC_INTRUSION_DETECTED)

208 = MAC Spoofing

Application and Device control:

238 = Device control disabled device

239 = Buffer Overflow Event

240 = Software protection has thrown an exception

EVENT_TIME The event-generated time (in GMT). bigint, not null


36 Agent Security Logs data table
Agent Security Logs schema

Table 6-1 Agent Security Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

SEVERITY The level of severity that is defined in Security Rule. int, not null

Possible values are as follows:

Critical = 0 - 3

Major = 4 - 7

Minor = 8 - 11

Info = 12 - 15

AGENT_ID The GUID of the agent. char(32), null

HARDWARE_KEY The hash of the computer hardware information. char(32), null

HOST_NAME The host name of the client computer. nvarchar(256),


varchar(256), null

LOCAL_HOST_IP The IP address of local computer (IPv4). bigint, null

REMOTE_HOST_IP The IP address of remote computer (IPv4). bigint, null

REMOTE_HOST_NAME The name of remote computer. It may be empty if the nvarchar(64),


name resolution failed. varchar(64), null

TRAFFIC_DIRECTION The direction of traffic. Enum (unknown = 0; inbound = tinyint, null


1; outbound = 2)

NETWORK_PROTOCOL The protocol type: Enum (OTHERS = 1; TCP = 2; UDP = 3; tinyint, null
ICMP = 4)

HACK_TYPE It is a reason if the Event ID is TSLOG_SEC_NO_AV. int, null

It is the intrusion ID if the Event ID is


TSLOG_SEC_INTRUSION_DETECTED.

It is additional information if event ID is TSLOG_SEC_AV.

Possible reasons are as follows:

Process is not running - Bit 0 is 1

Signature is out of date - Bit 1 is 1

Recovery was tried - Bit 2 is 1

BEGIN_TIME The start time of the security issue. bigint, null


Agent Security Logs data table 37
Agent Security Logs schema

Table 6-1 Agent Security Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

END_TIME The end time of the security issue. End time is an optional bigint, null
field because the software may fail to detect the exact end
time of traffic, like UDP. In those cases, the end time is
equal to the begin time.

REPETITION The number of attacks. When a hacker launches a mass int, null
attack, it may be damped to one event by the log system.

APP_NAME The full path of the application involved. It may be empty nvarchar(256),
if an unknown application is involved or if no application varchar(256), null
is involved. For example, the ping of death
denial-of-service attack doesn’t have an AppName because
it attacks the operating system itself.

EVENT_DESC A description of the event. Usually, the first line of the nvarchar(2000),
description is treated as “summary". varchar(4000), null

EVENT_DATA Additional data in binary format. This field is optional. varbinary(3000), null

ALERT ALERT reflects the alert attribute in profile action. If the tinyint, null
Network Threat Protection policy indicates that the event
should be considered for server-side notification
generation, the ALERT field is set to 1.

Possible values are as follows:

Yes = 1

No = 0

SEND_SNMP_TRAP SEND_SNMP_TRAP reflects the send SNMP trap action. tinyint, null
SEND_SNMP_TRAP is true if send is true.

Possible values are as follows:

Yes = 1

No = 0

LOCAL_HOST_MAC The MAC address of the local computer. varchar(18), null

REMOTE_HOST_MAC The MAC address of the remote computer. varchar(18), null

LOCATION_NAME The location that is used when the event occurs. nvarchar(256),
varchar(256), null

USER_NAME The logon user name. nvarchar(256),


varchar(256), null
38 Agent Security Logs data table
Agent Security Logs schema

Table 6-1 Agent Security Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

DOMAIN_NAME The logon domain name. nvarchar(256),


varchar(256), null

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260),
varchar(260), null

RESERVED_BINARY varbinary(1900), null

AGENT_SECURITY_LOG_IDX* The log index unique ID. char(32), null


Chapter 7
Agent System Logs data
table
This chapter includes the following topics:

■ Agent System Logs schema

Agent System Logs schema


Table 7-1 describes the database schema for the Agent System logs.
This schema has two tables. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_AGENT_SYSTEM_LOG_1_LOG_IDX or
I_AGENT_SYSTEM_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.

Table 7-1 Agent System Logs 1 and 2 schema

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null
40 Agent System Logs data table
Agent System Logs schema

Table 7-1 Agent System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null

SITE_ID The GUID of the site to which the log belongs. char(32), not null

SERVER_ID The GUID of the server to which the log belongs. char(32), not null

GROUP_ID The GUID of the group to which the log belongs. char(32), not null

COMPUTER_ID The GUID of the client computer that is associated with the char(32), not null
agent system log.

TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
Agent System Logs data table 41
Agent System Logs schema

Table 7-1 Agent System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

EVENT_ID int, not null


42 Agent System Logs data table
Agent System Logs schema

Table 7-1 Agent System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

An event ID from the Symantec Endpoint Protection agent.

AGENT_SYSTEM_INSTALL_EVENT_TYPES = Installation
events:

Possible values include the following:

0x12070001 = Internal error

0x12070101 = Install complete

0x12070102 = Restart recommended

0x12070103 = Restart required

0x12070104 = Installation failed

0x12070105 = Uninstallation complete

0x12070106 = Uninstallation failed

0x12071037 = Symantec AntiVirus installed

0x12071038 = Symantec Firewall installed

0x12071039 = Uninstall

0x1207103A = Uninstall rolled-back

AGENT_SYSTEM_SERVICE_EVENT_TYPES = Service events:

Possible values include the following:

0x12070201 = Service starting

0x12070202 = Service started

0x12070203 = Service start failure

0x12070204 = Service stopped

0x12070205=Service stop failure

0x1207021A = Attempt to stop service

AGENT_SYSTEM_CONFIG_EVENT_TYPES = Configuration
events:

Possible values include the following:

0x12070206 = Config import complete

0x12070207 = Config import error

0x12070208 = Config export complete

0x12070209 = Config export error


Agent System Logs data table 43
Agent System Logs schema

Table 7-1 Agent System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

AGENT_SYSTEM_HI_EVENT_TYPES = Host Integrity


events:

Possible values include the following:

0x12070210 = Host Integrity disabled

0x12070211 = Host Integrity enabled

0x12070220 = NAP integration enabled

AGENT_SYSTEM_IMPORT_EVENT_TYPES = Import events:

Possible values include the following:

0x12070214 = Successfully imported advanced rule

0x12070215 = Failed to import advanced rule

0x12070216 = Successfully exported advanced rule

0x12070217 = Failed to export advanced rule

AGENT_SYSTEM_CLIENT_EVENT_TYPES = Client events:

Possible values include the following:

0x12070218 = Client Engine enabled

0x12070219 = Client Engine disabled

0x12071046 = Proactive Threat Scanning is not supported


on this platform

0x12071047 = Proactive Threat Scanning Load Error

AGENT_SYSTEM_SERVER_EVENT_TYPES = Server events:

Possible values include the following:

0x12070301 = Server connected

0x12070302 = No server response

0x12070303 = Server connection failed

0x12070304 = Server disconnected

0x120B0001 = Cannot reach server

0x120B0002 = Reconnected server

AGENT_SYSTEM_PROFILE_EVENT_TYPES = Policy events:

Possible values include the following:

0x12070306 = New policy received


44 Agent System Logs data table
Agent System Logs schema

Table 7-1 Agent System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

0x12070307 = New policy applied

0x12070308 = New policy failed

0x12070309 = Cannot download policy

0x120B0005 = Cannot download policy

0x1207030A = Have latest policy

0x120B0004 = Have latest policy

AGENT_SYSTEM_AV_EVENT_TYPES = Antivirus engine


events:

Possible values include the following:

0x12071006 = Scan Omission

0x1207100B = Virus Behavior Detected

0x1207100C = Configuration Changed

0x12071010 = Definition File Download

0x12071012 = Sent To Quarantine Server

0x12071013 = Delivered To Symantec

0x12071014 = Security Response Backup

0x12071015 = Scan Aborted

0x12071016 = Symantec AntiVirus Auto-Protect Load Error

0x12071017 = Symantec AntiVirus Auto-Protect Enabled

0x12071018 = Symantec AntiVirus Auto-Protect Disabled

0x1207101A = Scan Delayed

0x1207101B = Scan Restarted

0x12071027 = Symantec AntiVirus is using old virus


definitions

0x12071041 = Scan Suspended

0x12071042 = Scan Resumed

0x12071043 = Scan Duration Too Short

0x12071045 = Scan Enhancements Failed

AGENT_SYSTEM_LICENSE_EVENT_TYPES = License events:

Possible values include the following:


Agent System Logs data table 45
Agent System Logs schema

Table 7-1 Agent System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

0x1207101E = License Warning

0x1207101F = License Error

0x12071020 = License in Grace Period

0x12071023 = License Installed

0x12071025 = License Up-to-date

AGENT_SYSTEM_SECURITY_EVENT_TYPES = Security
events:

Possible values include the following:

0x1207102B = Computer not compliant with security policy

0x1207102C = Computer compliant with security policy

0x1207102D = Tamper Attempt

AGENT_SYSTEM_OTHER_EVENT_TYPES = Other events:

Possible values include the following:

0x1207020A = email post OK

0x1207020B = email post failure

0x1207020C = Update complete

0x1207020D = Update failure

0x1207020E = Manual location change

0x1207020F = Location changed

0x12070212 = Old Rasdll detected

0x12070213 = Autoupdate postponed

0x12070305 = Mode changed

0x1207030B = Cannot apply HI script

0x12070500 = System message from device control

0x12070600 = System message from anti-buffer overflow


driver

0x12071021 = Access Denied Warning

0x12071022 = Log Forwarding Error

0x12071044 = Client moved

EVENT_TIME The event-generated time (in GMT). bigint, not null


46 Agent System Logs data table
Agent System Logs schema

Table 7-1 Agent System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

SEVERITY The type of event. int, not null

Possible values are as follows:

INFO = 0

WARNING = 1

ERROR = 2

FATAL = 3

AGENT_ID The GUID of the agent. char(32), null

HARDWARE_KEY The hash of the computer hardware information. char(32), null

HOST_NAME The host name of client computer. nvarchar(256),


varchar(256), null

CATEGORY CATEGORY is not used now. int, null

EVENT_SOURCE The data source, such as NETPORT, NATSRV, etc. varchar(32), not null

EVENT_DESC A description of the event. Usually, the first line of the nvarchar(1024),
description is treated as “summary.” varchar(2048), null

EVENT_DATA Additional data in binary format. This field is optional. varbinary(2000), null

SEND_SNMP_TRAP SEND_SNMP_TRAP reflects the send SNMP trap action. tinyint, null
SEND_SNMP_TRAP is true if send is true.

Possible values are as follows:

Yes = 1

No = 0

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260),
varchar(260), null
Agent System Logs data table 47
Agent System Logs schema

Table 7-1 Agent System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

RESERVED_BINARY varbinary(2000), null

LOG_IDX* The log index unique ID. char(32), null


48 Agent System Logs data table
Agent System Logs schema
Chapter 8
Agent Traffic Logs data
table
This chapter includes the following topics:

■ Agent Traffic Logs schema

Agent Traffic Logs schema


Table 8-1 describes the database schema for the Agent Traffic logs.
This schema has two tables. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_AGENT_TRAFFIC_LOG_1_LOG_IDX or
I_AGENT_TRAFFIC_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.

Table 8-1 Agent Traffic Logs 1 and 2 schema

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null
50 Agent Traffic Logs data table
Agent Traffic Logs schema

Table 8-1 Agent Traffic Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

DOMAIN_ID The GUID of the domain to which the log belongs. char(32), not null

SITE_ID The GUID of the site to which the log belongs. char(32), not null

SERVER_ID The GUID of the server to which the log belongs. char(32), not null

GROUP_ID The GUID of the group to which the log belongs. char(32), not null

COMPUTER_ID The GUID of the client computer that is associated with the char(32), not null
agent traffic log.

TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.

EVENT_ID An event ID from Symantec Endpoint Protection agent. int, not null

Possible values are as follows:

301 = TCP initiated

302 = UDP datagram

303 = Ping request

304 = TCP completed

305 = Traffic (other)

306 = ICMP packet

307 = Ethernet packet

308 = IP packet

EVENT_TIME The event-generated time (in GMT). bigint, not null

SEVERITY Severity as defined in the Security Rule. int, not null

Possible values are as follows:

Critical = 0 - 3

Major = 4 - 7

Minor = 8 - 11

Info = 12 - 15

AGENT_ID The GUID of the agent. char(32), null

HARDWARE_KEY The hash of the computer hardware information. char(32), null


Agent Traffic Logs data table 51
Agent Traffic Logs schema

Table 8-1 Agent Traffic Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

HOST_NAME The host name of the client computer. nvarchar(256),


varchar(256), null

LOCAL_HOST_IP The IP address of the local computer (IPv4). bigint, null

REMOTE_HOST_IP The IP address of the remote computer (IPv4). bigint, null

REMOTE_HOST_NAME The name of the remote computer. It may be empty if the nvarchar(64), varchar(64),
name resolution failed. null

NETWORK_PROTOCOL The protocol type: Enum (OTHERS = 1; TCP = 2; UDP = 3; tinyint, null
ICMP = 4).

LOCAL_PORT The TCP/UDP port in the local computer (host byte-order). int, null
It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.

REMOTE_PORT The TCP/UDP port in the remote computer (host byte-order). int, null
It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.

TRAFFIC_DIRECTION The direction of traffic. Enum (unknown = 0; inbound = 1; tinyint, null


outbound = 2)

BEGIN_TIME The start time of the security issue. bigint, null

END_TIME The end time of the security issue. End time is an optional bigint, null
field because we may fail to detect the exact end time of
traffic, like UDP. In those cases, the end time is equal to
begin time.

REPETITION The number of attacks. Sometimes, when a hacker launches int, null
a mass attack, it may be damped to one event by the log
system.

APP_NAME The full path of application involved. It may be empty if an nvarchar(256),


unknown application is involved or if no application is varchar(256) , null
involved. For example, the ping of death denial-of-service
attack doesn’t have AppName because it attacks the
operating system itself.

BLOCKED Specify if the traffic was blocked. tinyint, not null

Possible values are as follows:

Yes = 1

No = 0
52 Agent Traffic Logs data table
Agent Traffic Logs schema

Table 8-1 Agent Traffic Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

RULE_ID The ID of rule that the event triggered. It is always 0 if rule char(32), null
ID is not specified in security rule. The field is helpful to
security rule troubleshooting. If multiple rules matched, it
logs the rule that has final decision on PacketProc
(pass/block/drop).

RULE_NAME The name of rule that the event triggered. It is always an nvarchar(256),
empty string if a rule name is not specified in the security varchar(256), null
rule. It is also used for troubleshooting. In theory, an IT
admin can know the rule by its ID. However, a name gives
the user a direct view of a rule that can be used.

ALERT ALERT reflects the alert attribute in the profile action. If tinyint, null
the Network Threat Protection policy indicates that the
event should be considered for server-side notification
generation, the ALERT field is set to 1.

Possible values are as follows:

Yes = 1

No = 0

SEND_SNMP_TRAP It reflects the send SNMP trap action. SEND_SNMP_TRAP tinyint, null
is true if send is true.

Possible values are as follows:

Yes = 1

No = 0

LOCAL_HOST_MAC The MAC address of local computer. varchar(18), null

REMOTE_HOST_MAC The MAC address of remote computer. varchar(18), null

LOCATION_NAME The location that was used when event occurs. nvarchar(256),
varchar(256), null

USER_NAME The logon user name. nvarchar(256),


varchar(256), null

DOMAIN_NAME The logon domain name. nvarchar(256),


varchar(256), null

RESERVED_INT1 int, null

RESERVED_INT2 int, null


Agent Traffic Logs data table 53
Agent Traffic Logs schema

Table 8-1 Agent Traffic Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260),
varchar(260), null

RESERVED_BINARY varbinary(2000), null

LOG_IDX* The log index unique ID. char(32), null


54 Agent Traffic Logs data table
Agent Traffic Logs schema
Chapter 9
Alert Filter data table
This chapter includes the following topics:

■ Alert Filter schema

Alert Filter schema


Table 9-1 describes the database schema for alert filter information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ALERTFILTER.

Table 9-1 Alert Filter schema

Database Field Name Comment Data Type

ALERTFILTER_IDX* Primary Key. char(32), not null

USER_ID The user ID. char(32), not null

FILTERNAME The user-specified name of the filter. nvarchar(255),


varchar(255), not null

STARTDATEFROM The start date. datetime, not null

STARTDATETO The end date. datetime, not null


56 Alert Filter data table
Alert Filter schema

Table 9-1 Alert Filter schema (continued)

Database Field Name Comment Data Type

RELATIVEDATETYPE Possible values are as follows: int, not null

0 = past week

1 = past month

2 = past three months

3 = past year

4 = past 24 hours

5 = current month

FILTERACKNOWLEDGED Possible values are as follows: nvarchar(255),


varchar(255), not null
1 = Acknowledged

0 = Unacknowledged

FILTERSUBJECT Possible values are as follows: nvarchar(255),


varchar(255), not null
AF = Authentication failure

CL = Client list changed

CS = Client security alert

ED = Enforcer Down

WL = Forced or commercial application detected

LA = New learned application

NV = New risk detected

NS = New software package

VO = Virus outbreak

DF = Server health

1V = Single risk event

SE = System event

UM = Unmanaged computer

ID = Virus definitions out-of-date

FILTERCREATEDBY The GUID of the administrator who created this alert filter. nvarchar(255),
varchar(255), not null

LASTCOLUMN Not used. varchar(255), not null


Alert Filter data table 57
Alert Filter schema

Table 9-1 Alert Filter schema (continued)

Database Field Name Comment Data Type

SERVERGROUP Not used. nvarchar(255),


varchar(255), not null

CLIENTGROUP Not used. nvarchar(255),


varchar(255), not null

PARENTSERVER Not used. nvarchar(255),


varchar(255), not null

COMPUTER Not used. nvarchar(255),


varchar(255), not null

THREATNAME Not used. nvarchar(255),


varchar(255), not null

THREATCATEGORY Not used. varchar(255), not null

SOURCE Not used. varchar(255), not null

ACTUALACTION Not used. varchar(255), not null

LIMITROWS The number of rows to use for pagination. int, not null

USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null

REPORTINPUTS Special parameters if a report needs them. nvarchar(64), varchar(64),


not null

NOTIFICATIONNAME The name of selected notification condition. nvarchar(255),


varchar(255), not null

USN A USN-based serial number; this ID is not unique. bigint, not null

TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = not deleted

1 = deleted
58 Alert Filter data table
Alert Filter schema
Chapter 10
Agent Status data table
This chapter includes the following topics:

■ Agent Status schema

Agent Status schema


Table 10-1 describes the database schema for agent status information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_AGENTSTATUS.

Table 10-1 Agent Status schema

Database Field Name Comment Data Type

IDX* Primary Key. char(32), not null


60 Agent Status data table
Agent Status schema

Table 10-1 Agent Status schema (continued)

Database Field Name Comment Data Type

AGENTTYPE Possible values for AGENTTYPE include the following: varchar(255), not null

SAV 10.x

LogSender

ClientInventory

SAV 11.x

AgentSweepingTask (Database maintenance)

TopThreatsTask (Gathers top and latest threats information)

VirusCatTask (Gathers virus properties)

ThreatCatTask (Gathers risk properties)

AGENTNAME Name that is associated with this agent. varchar(255), not null

for LogSender agents: Server Group name

for LogSenderSAVSMTP agents: mail gateway host name

for ClientInventory agents: name of Parent Server

else: blank

LASTRUNGMT Last time this agent ran stored in GMT. varchar(50), not null

REMOTE_TZ_OFFSET The time zone offset. int, not null

REPORTER_TZ_OFFSET The time zone offset. int, not null

MAIL Flag whether email has already been sent. int, not null

Possible values are as follows:

1 = Yes

0 = No

VERSION_BUILD The version/build (major.minor.build) of the agent. varchar(20), not null

MACHINE_NAME The computer name of the client computer. nvarchar(128),


varchar(128), not null

SERVERGROUP_IDX Pointer to IDENTITY_MAP table. char(32), not null

LASTRUN_DATA Extra data that is associated with the agent run, if any. nvarchar(255),
varchar(255), null
Chapter 11
Alert Message data table
This chapter includes the following topics:

■ Alert Message schema

Alert Message schema


Table 11-1 describes the database schema for alert message information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ALERTMSG.

Table 11-1 Alert Message schema

Database Field Name Comment Data Type

ALERT_IDX* Primary Key (one of 1 through 9). int, not null


62 Alert Message data table
Alert Message schema

Table 11-1 Alert Message schema (continued)

Database Field Name Comment Data Type

ALERT ALERT is a hard-coded English string that is used as a lookup varchar(128), not null
It corresponds to an event ID from the Symantec Endpoint
Protection agent.

Possible values are as follows:

1 = Virus found

2 = Security risk found

3 is not used

4 is not used

5 = Commercial application detected

6 = Forced proactive threat detected

7 = Proactive detection now permitted

8 = Potential risk found

9 = Risk sample was submitted to Symantec


Chapter 12
Alerts data table
This chapter includes the following topics:

■ Alerts schema

Alerts schema
Table 12-1 describes the database schema for alerts information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ALERTS.

Table 12-1 Alerts schema

Database Field Name Comment Data Type

IDX* Primary Key. char(32), not null

ALERT_IDX Pointer to table ALERTMSG. int, not null

COMPUTER_IDX Foreign key to SEM_COMPUTER.COMPUTER_ID. char(32), not null


64 Alerts data table
Alerts schema

Table 12-1 Alerts schema (continued)

Database Field Name Comment Data Type

SOURCE A hard-coded English string that is used as a lookup key varchar(50), not null
for the following scan types:

"Scheduled Scan"

"Manual Scan"

"Real Time Scan"

"Integrity Shield"

"Definition downloader"

"System"

"Startup Scan"

"DefWatch"

"Manual Quarantine"

"Reboot Processing"

"Heuristic Scan"

VIRUSNAME_IDX Pointer to table VIRUS. char(32), not null

NOOFVIRUSES The number of events for the aggregated event record. int, not null
This number can be due to client-side aggregation,
server-side compression, or both.

FILEPATH The file path of attacked file. nvarchar(255), varchar(255),


not null

DESCRIPTION A description of the event. nvarchar(255), varchar(255),


not null

ACTUALACTION_IDX Pointer to table ACTUALACTION, this is the action int, not null
taken on the risk.

REQUESTEDACTION_IDX Pointer to table ACTUALACTION; this is the action int, not null
requested by the policy.

SECONDARYACTION_IDX Pointer to table ACTUALACTION; this is the secondary int, not null
action requested by the policy.

ALERTDATETIME The time of event occurrences. datetime, not null

ALERTINSERTTIME The time at which the event was inserted in to the datetime, not null
database.
Alerts data table 65
Alerts schema

Table 12-1 Alerts schema (continued)

Database Field Name Comment Data Type

SERVERGROUP_IDX Pointer to table IDENTITY_MAP; this is the Symantec char(32), not null
Endpoint Protection Manager domain GUID.

USER_NAME The name of the user that was logged onto the computer nvarchar(64), varchar(64),
when the event took place. not null

PARENTSERVER_IDX Pointer to table IDENTITY_MAP; this is the Symantec char(32), not null
Endpoint Protection Manager server GUID.

CLIENTGROUP_IDX Pointer to table IDENTITY_MAP; this is the Symantec char(32), not null
Endpoint Protection Manager group GUID.

SOURCE_COMPUTER_NAME The source of the threat. It is logged when threat tracer nvarchar(64), varchar(64),
is enabled in the antivirus and antispyware policy. not null

SOURCE_COMPUTER_IP The source of the threat. It is logged when threat tracer bigint, not null
is enabled in the antivirus and antispyware policy.

MOTHER_IDX Pointer to the related compressed event in the ALERTS char(32), not null
table. This is the compressed event created by database
maintenance. A value here means that this event has
been aggregated server-side and is a child event.

LAST_LOG_SESSION_GUID An ID that is used by the client to keep track of related char(32), not null
threat events.

ALERTENDDATETIME The time at which the event ended. This is the end of datetime, not null
the aggregated event time.

HPP_APP_IDX Pointer to HPP_APPLICATION table. varchar(32), not null

SITE_IDX Pointer to table IDENTITY_MAP; this is the Symantec char(32), null


Endpoint Protection Manager site GUID.

VBIN_ID The client-side ID of the quarantined threat, if bigint, not null


quarantined.

SCAN_ID Pointer to the scan table event that picked up this event. bigint, not null

USN A USN-based serial number; this ID is not unique. bigint, not null

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
66 Alerts data table
Alerts schema

Table 12-1 Alerts schema (continued)

Database Field Name Comment Data Type

DELETED Deleted row: tinyint, not null

0 = not deleted

1 = deleted
Chapter 13
Anomaly Detection data
table
This chapter includes the following topics:

■ Anomaly Detection schema

Anomaly Detection schema


Table 13-1 describes the database schema for anomaly detection information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYDETECTION.

Table 13-1 Anomaly Detection schema

Database Field Name Comment Data Type

ANOMALY_DETECTION_IDX* Primary Key. char(32), not null

ANOMALY_DETECTION_OPERATION_ID Pointer to table int, not null


'Anomalydetectionoperation'.

ANOMALY_DETECTION_TYPE_ID Pointer to table 'Anomalydetectiontype'. int, not null

ACTION_OPERAND The file or the registry key on which this nvarchar(512),


action took place. varchar(512), not null

USN A USN-based serial number; this ID is not bigint, not null


unique.
68 Anomaly Detection data table
Anomaly Detection schema

Table 13-1 Anomaly Detection schema (continued)

Database Field Name Comment Data Type

TIME_STAMP The time when this database record was bigint, not null
entered or modified in the database, in
milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = not deleted

1 = deleted
Chapter 14
Anomaly Detection
Operation data table
This chapter includes the following topics:

■ Anomaly Detection Operation schema

Anomaly Detection Operation schema


Table 14-1 describes the database schema for anomaly detection operation
information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYDETECTIONOPERATION.

Table 14-1 Anomaly Detection Operation schema

Database Field Name Comment Data Type

DETECTION_OPERATION_ID* 0-8 int, not null


70 Anomaly Detection Operation data table
Anomaly Detection Operation schema

Table 14-1 Anomaly Detection Operation schema (continued)

Database Field Name Comment Data Type

DETECTION_OPERATION_DESC Detection_Operation_ID, varchar(255), not null


Detection_Operation_Desc. A
hard-coded English string that is
used for a lookup

Possible values are as follows:

0 = Unknown

1 = Scan

2 = Present

3 = Not Present

4 = Equal

5 = Not Equal

6 = Equal (Case-insensitive)

7 = Not Equal (Case-insensitive)

8 = Scan Memory
Chapter 15
Anomaly Detections data
table
This chapter includes the following topics:

■ Anomaly Detections schema

Anomaly Detections schema


If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as the Primary
Key, PK_ANOMALYDETECTIONS.

Table 15-1 Anomaly Detections schema

Database Field Name Comment Data Type

ALERT_EVENT_IDX Foreign key to ALERTS.IDX. char(32), not null

ANOMALY_DETECTION_IDX Pointer to table 'anomalydetection'. char(32), not null

STATUS The scan detection status. Currently always 1 to mean int, not null
"successful detection performed". Other values are
reserved for future use.

LOG_SESSION_GUID The LOG_SESSION_GUID is an ID that the client uses char(32), not null
to keep track of related threat events.

USN A USN-based serial number; this ID is not unique. bigint, not null
72 Anomaly Detections data table
Anomaly Detections schema

Table 15-1 Anomaly Detections schema (continued)

Database Field Name Comment Data Type

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = not deleted

1 = deleted

ID* Primary Key (added 11.0.1). char(32), not null


Chapter 16
Anomaly Detection Type
data table
This chapter includes the following topics:

■ Anomaly Detection Type schema

Anomaly Detection Type schema


If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYDETECTIONTYPE .

Table 16-1 Anomaly Detection Type schema

Database Field Name Comment Data Type

DETECTION_TYPE_ID* Primary Key. int, not null


74 Anomaly Detection Type data table
Anomaly Detection Type schema

Table 16-1 Anomaly Detection Type schema (continued)

Database Field Name Comment Data Type

DETECTION_TYPE_DESC Detection_Type_ID, varchar(255), not null


Detection_Type_Desc. A hard-coded
English string that is used for a
lookup

Possible values are as follows:

1000 = Registry

1001 = File

1002 = Process

1003 = Batch File

1004 = INI File

1005 = Service

1006 = Infected File

1007 = COM Object

1008 = Hosts File Entry

1009 = Directory

1010 = Layered Service Provider


Chapter 17
Anomaly Remediation data
table
This chapter includes the following topics:

■ Anomaly Remediation schema

Anomaly Remediation schema


If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYREMEDIATION.

Table 17-1 Anomaly Remediation schema

Database Field Name Comment Data Type

ANOMALY_REMEDIATION_IDX* Primary Key. char(32), not null

ANOMALY_REMEDIATION_OPERATION_ID Pointer to table int, not null


'anomalyremediationoperation'.

ANOMALY_REMEDIATION_TYPE_ID Pointer to table int, not null


'anomalyremediationtype'.

ACTION_OPERAND The file or the registry key on nvarchar(512), varchar(512),


which this action took place. not null

USN A USN-based serial number; bigint, not null


this ID is not unique.
76 Anomaly Remediation data table
Anomaly Remediation schema

Table 17-1 Anomaly Remediation schema (continued)

Database Field Name Comment Data Type

TIME_STAMP The time when this database bigint, not null


record was entered or modified
in the database, in milliseconds
since 1970.

DELETED Deleted row: tinyint, not null

0 = not deleted

1 = deleted
Chapter 18
Anomaly Remediation
Operation data table
This chapter includes the following topics:

■ Anomaly Remediation Operation schema

Anomaly Remediation Operation schema


Table 18-1 describes the database schema for anomaly remediation operation
information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYREMEDIATIONOPERATION.

Table 18-1 Anomaly Remediation Operation schema

Database Field Name Comment Data Type

REMEDIATION_OPERATION_ID* Primary Key. int, not null


78 Anomaly Remediation Operation data table
Anomaly Remediation Operation schema

Table 18-1 Anomaly Remediation Operation schema (continued)

Database Field Name Comment Data Type

REMEDIATION_OPERATION_DESC varchar(255), not


null
Anomaly Remediation Operation data table 79
Anomaly Remediation Operation schema

Table 18-1 Anomaly Remediation Operation schema (continued)

Database Field Name Comment Data Type

Remediation_Operation_ID,
Remediation_Operation_Desc. A hard-coded
English string that is used for a lookup.

Possible values are as follows:

0 = Unknown

1 = Delete

2 = Delete Line

3 = Move

4 = Create Empty File

5 = Set

6 = Terminate

7 = Suspend

8 = Stop

9 = Remove

10 = Handle Threat

11 = Set IP Address

12 = Set Domain Name

13 = Deny Access

999 = Invalid

1001 = Move

1002 = Rename

1003 = Delete

1004 = Leave Alone

1005 = Clean

1006 = Remove Macros

1007 = Save As

1008 = Move Back

1010 = Rename Back

1011 = Undo

1012 = Bad
80 Anomaly Remediation Operation data table
Anomaly Remediation Operation schema

Table 18-1 Anomaly Remediation Operation schema (continued)

Database Field Name Comment Data Type

1013 = Backup

1014 = Pending

1015 = Partial

1016 = Terminate

1017 = Exclude

1018 = Reboot Processing

1019 = Clean By Deletion

1020 = Access Denied


Chapter 19
Anomaly Remediations data
table
This chapter includes the following topics:

■ Anomaly Remediations schema

Anomaly Remediations schema


Table 19-1 describes the database schema for anomaly remediations information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYREMEDIATIONS.

Table 19-1 Anomaly Remediations schema

Database Field Name Comment Data Type

ALERT_EVENT_IDX Foreign key to ALERTS.IDX. char(32), not null

ANOMALY_REMEDIATION_IDX Pointer to table char(32), not null


'anomalyremediation'.

STATUS 1 = successful remediation, 0 = failed int, not null


remediation, no default.

LOG_SESSION_GUID The ID that the client uses to keep char(32), not null
track of related threat events.
82 Anomaly Remediations data table
Anomaly Remediations schema

Table 19-1 Anomaly Remediations schema (continued)

Database Field Name Comment Data Type

USN A USN-based serial number; this ID bigint, not null


is not unique.

TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = Not deleted

1 = deleted

ID* Primary Key (added 11.0.1). char(32), not null


Chapter 20
Anomaly Remediation Type
data table
This chapter includes the following topics:

■ Anomaly Remediation Type schema

Anomaly Remediation Type schema


Table 20-1 describes the database schema for anomaly remediation type
information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_ANOMALYREMEDIATIONTYPE.

Table 20-1 Anomaly Remediation Type schema

Database Field Name Comment Data Type

REMEDIATION_TYPE_ID* Primary Key. int, not null


84 Anomaly Remediation Type data table
Anomaly Remediation Type schema

Table 20-1 Anomaly Remediation Type schema (continued)

Database Field Name Comment Data Type

REMEDIATION_TYPE_DESC The number is the varchar(255), not null


REMEDIATION_TYPE_ID and the
string on the right of the equal sign
is the REMEDIATION_TYPE_DESC
that corresponds to the numeric ID.
The English string is used as a lookup
key.

Possible values are as follows:

2000 = Registry

2001 = File

2002 = Process

2003 = Batch File

2004 = INI File

2005 = Service

2006 = Infected File

2007 = COM Object

2008 = Hosts File Entry

2009 = Directory

2010 = Layered Service Provider

2011 = Internet Browser Cache


Chapter 21
Audit Report data table
This chapter includes the following topics:

■ Audit Report schema

Audit Report schema


Table 21-1 describes the database schema for audit report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_AUDITREPORT.

Table 21-1 Audit Report schema

Database Field Name Comment Data Type

AUDITFILTER_IDX* Primary Key. char(32), not null

USER_ID The GUID of the administrator who char(32), not null


created this filter.

FILTERNAME The name of the filter. nvarchar(255), varchar(255), not null

STARTDATEFROM The start time for the filter. datetime, not null

STARTDATETO The end time for the filter. datetime, not null
86 Audit Report data table
Audit Report schema

Table 21-1 Audit Report schema (continued)

Database Field Name Comment Data Type

RELATIVEDATETYPE Possible values are as follows: int, not null

0 = past week

1 = past month

2 = past three months

3 = past year

4 = past 24 hours

5 = current month

EVENTTYPE Possible values are as follows: int, null

0 = Policy added

1 = Policy deleted

2 = Policy edited

3 = Add shared policy upon system


install

4 = Add shared policy upon system


upgrade

5 = Add shared policy upon domain


creation

SERVERGROUPLIST Comma-separated domain names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

PARENTSERVERLIST Comma-separated server names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

USERLIST Comma-separated user names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

POLICYNAMELIST Comma-separated policy names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

SITELIST Comma-separated site names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.
Audit Report data table 87
Audit Report schema

Table 21-1 Audit Report schema (continued)

Database Field Name Comment Data Type

SORTORDER The column/field by which to sort varchar(32), not null


data.

SORTDIR Possible values are as follows: varchar(5), not null

DESC = descending sort

ASC = ascending sort

LIMITROWS The number of rows to use for int, not null


pagination.

USERELATIVE Use relative dates ('on') or absolute char(2), not null


dates.

REPORT_IDX Not used. int, not null

REPORTINPUTS Special parameters if a report needs nvarchar(64), varchar(64), not null


them.

USN A USN-based serial number. This ID bigint, not null


is not unique.

TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.

DELETED Deleted flag: tinyint, not null

0 = Not deleted

1 = Deleted
88 Audit Report data table
Audit Report schema
Chapter 22
Basic Metadata data table
This chapter includes the following topics:

■ Basic Metadata schema

Basic Metadata schema


Table 22-1 describes the database schema for basic metadata information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_BASIC_METADATA.

Table 22-1 Basic Metadata schema

Database Field Name Comment Data Type

CHECKSUM The checksum of the XML content. char(32), not null

CONTENT The XML content of the schema image, not null


object.

DELETED Deleted flag: tinyint, not null

0 = Deleted

1 = Not deleted

ID* The GUID of the schema object. char(32), not null

OWNER The GUID of the owner. It only char(32), null


applies to a private object.
90 Basic Metadata data table
Basic Metadata schema

Table 22-1 Basic Metadata schema (continued)

Database Field Name Comment Data Type

TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflict.

TYPE The type name of the schema object. varchar(256), not null

USN The update serial number; used by bigint, not null


replication.

DOMAIN_ID The GUID of the domain to which the char(32), null


object belongs.

SemRootConfig and SemSite do not


have DOMAIN_ID.

REF_ID The object reference ID. varchar(32), null

NAME The object name. nvarchar(2000), varchar(2000), null

DESCRIPTION The object description. nvarchar(256), varchar(256), null

LAST_MODIFY_TIME The last modify time. bigint, null

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260), varchar(260), null

RESERVED_BINARY varbinary(2000), null


Chapter 23
Behavior Report data table
This chapter includes the following topics:

■ Behavior Report schema

Behavior Report schema


Table 23-1 describes the database schema for behavior report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_BEHAVIORREPORT.

Table 23-1 Behavior report schema

Database Field Name Comment Data Type

BEHAVIORFILTER_IDX* Primary Key. char(32), not null

USER_ID The GUID of user who created this char(32), not null
filter.

FILTERNAME The name of the filter. nvarchar(255), varchar(255), not null

STARTDATEFROM The filter start date. datetime, not null

STARTDATETO The filter end date. datetime, not null


92 Behavior Report data table
Behavior Report schema

Table 23-1 Behavior report schema (continued)

Database Field Name Comment Data Type

RELATIVEDATETYPE Possible values are as follows: int, not null

0 = past week

1 = past month

2 = past three months

3 = past year

4 = past 24 hours

5 = current month

BEHAVIORTYPE Possible values are as follows: tinyint, null

1 = Application type

2 = Device Control type

SEVERITY Possible values are as follows: int, null

1 = Critical

5 = Major

9 = Minor

13 = Information

EVENTTYPE For Application Control. int, null

Possible values are as follows:

501 = Application Control Driver

502 = Application Control Rules

999 = Tamper Protection

ACTION Possible values are as follows: tinyint, null

0 = Allow

1 = Block

2 = Ask

3 = Continue

4 = Terminate

SERVERGROUPLIST Comma-separated domain names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.
Behavior Report data table 93
Behavior Report schema

Table 23-1 Behavior report schema (continued)

Database Field Name Comment Data Type

CLIENTGROUPLIST Comma-separated group names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

PARENTSERVERLIST Comma-separated server names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

COMPUTERLIST Comma-separated computer names nvarchar(512), varchar(512), not null


by which to filter. These names can
contain wildcard characters.

SITELIST Comma-separated site names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

CALLERPROCESSLIST Comma-separated process names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

IPADDRESSLIST Comma-separated IP by which to nvarchar(255), varchar(255), not null


filter. These names can contain
wildcard characters.

USERLIST Comma-separated user names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

TEST_MODE Possible values are as follows: tinyint, null

1 = Yes

0 = No

SORTORDER The table column to sort by. varchar(32), not null

SORTDIR Possible values are as follows: varchar(5), not null

DESC = descending order

ASC = Ascending order

LIMITROWS The number of rows to show for int, not null


pagination.

USERELATIVE Use relative dates ('on') or absolute char(2), not null


dates.
94 Behavior Report data table
Behavior Report schema

Table 23-1 Behavior report schema (continued)

Database Field Name Comment Data Type

REPORT_IDX Not used. int, not null

REPORTINPUTS Special parameters if a report needs nvarchar(64), varchar(64), not null


them.

USN A USN-based serial number; this ID bigint, not null


is not unique.

TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.

DELETED Deleted flag; tinyint, not null

0 = Not deleted

1 = Deleted
Chapter 24
Binary File data table
This chapter includes the following topics:

■ Binary File schema

Binary File schema


Table 24-1 describes the database schema for binary file information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_BINARY_FILE.

Table 24-1 Binary File schema

Database Field Name Comment Data Type

CHECKSUM The checksum of XML content. char(32), null

CONTENT The XML content of the schema image, null


object.

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

1 = Deleted

0 = Not Deleted

ID* The GUID of the schema object. char(32), not null


96 Binary File data table
Binary File schema

Table 24-1 Binary File schema (continued)

Database Field Name Comment Data Type

OWNER The GUID of the owner. It only char(32), null


applies to private object

TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflict.

TYPE The type name of the schema object. varchar(256), null

USN The update serial number; used by bigint, not null


replication.

DOMAIN_ID The GUID of the domain to which the char(32), null


binary file belongs.

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260), varchar(260), null

RESERVED_BINARY varbinary(2000), null


Chapter 25
Command data table
This chapter includes the following topics:

■ Command schema

Command schema
Table 25-1 describes the database schema for command information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_COMMAND.

Table 25-1 Command schema

Database Field Name Comment Data Type

HARDWARE_KEY* The hash of the computer hardware information. char(32), not null

COMMAND_ID* The GUID of the command object. This GUID corresponded char(32), not null
to the ID in the Basic Metadata table.

DOMAIN_ID The domain ID currently being administered when the char(32), not null
command is created.

USN The update serial number; used by replication. bigint, not null

BEGIN_TIME The time that the command was launched at the client (in bigint, not null
GMT).

LAST_UPDATE_TIME The time of the last status that the client reported (in GMT). bigint, not null
98 Command data table
Command schema

Table 25-1 Command schema (continued)

Database Field Name Comment Data Type

STATE_ID Command status: a numeric value that corresponds to one int, not null
of the following values:

0 = INITIAL

1 = RECEIVED

2 = IN_PROGRESS

3 = COMPLETED

4 = REJECTED

5 = CANCELLED

6 = ERROR

When first created, the command’s status = INITIAL. It


indicates that the endpoint has not received it yet.

SUB_STATE_ID Command-specific status. int, null

Possible values are as follows:

0 = Success

1 = Client did not execute the command

2 = Client did not report any status

3 = Command was a duplicate and not executed

4 = Spooled command cannot restart

100 = Success

101 = Security risk found

102 = Scan was suspended

103 = Scan was aborted

105 = Scan did not return status

110 = Auto-Protect cannot be turned on

120 = LiveUpdate download is in progress

121 = LiveUpdate download failed

131 = Quarantine delete failed

132 = Quarantine delete partial success

SUB_STATE_DESC Command-specific extra information, such as the number nvarchar(260),


of files that were scanned or an error message. varchar(260), null
Command data table 99
Command schema

Table 25-1 Command schema (continued)

Database Field Name Comment Data Type

ESTIMATED_DURATION The agent estimation of command duration in minutes. 0 = int, not null
no estimate or negligible time.

PERCENT_COMPLETE Progress (0-100%) of the command that was based on tinyint, not null
estimated duration.

TIME_STAMP The time when the command was added into the database, bigint, not null
in milliseconds since 1970.

DELETED The deleted flag of the schema object: tinyint, not null

1 = Deleted

0 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 varchar(260), null

RESERVED_BINARY varbinary(1000),
null
100 Command data table
Command schema
Chapter 26
Command Report data table
This chapter includes the following topics:

■ Command Report schema

Command Report schema


Table 26-1 describes the database schema for command report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_COMMANDREPORT.

Table 26-1 Command Report schema

Database Field Name Comment Data Type

COMMANDFILTER_IDX* Primary Key. char(32), not null

USER_ID The GUID of user who created this filter. char(32), not null

FILTERNAME The name of the filter. nvarchar(255),


varchar(255), not null

STARTDATEFROM The start time. datetime, not null

STARTDATETO The end time. datetime, not null


102 Command Report data table
Command Report schema

Table 26-1 Command Report schema (continued)

Database Field Name Comment Data Type

RELATIVEDATETYPE Possible values are as follows: int, not null

0 = past week

1 = past month

2 = past three months

3 = past year

4 = past 24 hours

5 = current month

STATE_ID Command status. int, null

Possible values are as follows:

0 = Not received

1 = Received

2 = In progress

3 = Completed

4 = Rejected

5 = Canceled

6 = Error
Command Report data table 103
Command Report schema

Table 26-1 Command Report schema (continued)

Database Field Name Comment Data Type

SUB_STATE_ID Status Details. int, null

Possible values are as follows:

0 = Success

1 = Client did not execute the command

2 = Client did not report any status

3 = Command was a duplicate and not executed

4 = Spooled command cannot restart

101 = Security risk found

102 = Scan was suspended

103 = Scan was aborted

105 = Scan did not return status

110 = Auto-Protect cannot be turned on

120 = LiveUpdate download is in progress

121 = LiveUpdate download failed

131 = Quarantine delete failed

132 = Quarantine delete partial success

PERCENT_COMPLETE The command progress. tinyint, null

COMPUTERLIST A comma-separated list of computer names to filter. These nvarchar(512),


names can contain wildcard characters. varchar(512), not null

SORTORDER The column name in the table to sort by. varchar(32), not null

SORTDIR Possible values are as follows: varchar(5), not null

DESC = Descending order

ASC = Ascending order

LIMITROWS The number of rows to use for pagination. int, not null

USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null

REPORT_IDX Not used. int, not null

REPORTINPUTS Special parameters if a report needs them. nvarchar(64),


varchar(64), not null

USN A USN-based serial number; this ID is not unique. bigint, not null
104 Command Report data table
Command Report schema

Table 26-1 Command Report schema (continued)

Database Field Name Comment Data Type

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.

DELETED Deleted rows: tinyint, not null

0 = not deleted

1 = deleted
Chapter 27
Compliance Report data
table
This chapter includes the following topics:

■ Compliance Report schema

Compliance Report schema


Table 27-1 describes the database schema for compliance report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_COMPLIANCEREPORT.

Table 27-1 Compliance Report schema

Database Field Name Comment Data Type

COMPLIANCEFILTER_IDX* Primary Key. char(32), not null

USER_ID The GUID of user who created this filter. char(32), not null

FILTERNAME The filter name. nvarchar(255),


varchar(255), not null

STARTDATEFROM The start date. datetime, not null

STARTDATETO The end date. datetime, not null


106 Compliance Report data table
Compliance Report schema

Table 27-1 Compliance Report schema (continued)

Database Field Name Comment Data Type

RELATIVEDATETYPE Possible values are as follows: int, not null

0 = past week

1 = past month

2 = past three months

3 = past year

4 = past 24 hours

5 = current month

COMPLIANCE_TYPE Possible values are as follows: tinyint, null

1 = Enforcer Server

2 = Enforcer Client

3 = Enforcer Traffic

4 = Host Compliance

5 = Attack (Firewall logs)

6 = Device Control

SEVERITY Possible values are as follows: int, null

1 = Critical (which filters on SEVERITY >= 0 AND


SEVERITY <= 3)

5 = Major (which filters on SEVERITY >= 4 AND


SEVERITY <= 7)

9 = Minor (which filters on SEVERITY >= 8 AND


SEVERITY <= 11)

13 = Info (which filters on SEVERITY >= 12 AND


SEVERITY <= 15)
Compliance Report data table 107
Compliance Report schema

Table 27-1 Compliance Report schema (continued)

Database Field Name Comment Data Type

EVENT_ID int, null


108 Compliance Report data table
Compliance Report schema

Table 27-1 Compliance Report schema (continued)

Database Field Name Comment Data Type

Events for Enforcer Server.

Possible values are as follows:

1 = Enforcer registered

2 = Enforcer failed to register

5 = Enforcer downloaded policy

7 = Enforcer downloaded sylink.xml

9 = Server received Enforcer log

12 = Server received Enforcer information

Events for Enforcer Traffic.

Possible values are as follows:

17 = Incoming traffic blocked

18 = Outgoing traffic blocked

33 = Incoming traffic allowed

34 = Outgoing traffic allowed

Events for Host compliance.

Possible values are as follows:

209 = Host Integrity failed

210 = Host Integrity passed

221 = Host Integrity check failed but reported as PASS

237 = Host Integrity custom log entry

Events for Attack (firewall).

Possible values are as follows:

207 = Active Response

211 = Active Response disengaged

219 = Active Response canceled

217 = Executable file change accepted

218 = Executable file change denied

220 = Application Hijack

201 = N/A (invalid traffic by rule)

202 = Port Scan


Compliance Report data table 109
Compliance Report schema

Table 27-1 Compliance Report schema (continued)

Database Field Name Comment Data Type

203 = Denial-of-service attack

204 = Trojan horse

206 = Intrusion Prevention

208 = MAC Spoofing

Events for Device control:

238 = Device control disabled device

BLOCKED Possible values are as follows: tinyint, null

0 = Blocked

1 = Not Blocked

NETWORK_PROTOCOL Possible values are as follows: tinyint, null

1 = Other

2 = TCP

3 = UDP

4 = ICMP

TRAFFIC_DIRECTION Possible values are as follows: tinyint, null

1 = Inbound

2 = Outbound

0 = Unknown

SERVERGROUPLIST Comma-separated domain names by which to filter. nvarchar(255),


These names can contain wildcard characters. varchar(255), not null

CLIENTGROUPLIST Comma-separated group names by which to filter. These nvarchar(255),


names can contain wildcard characters. varchar(255), not null

PARENTSERVERLIST Comma-separated server names by which to filter. These nvarchar(255),


names can contain wildcard characters. varchar(255), not null

COMPUTERLIST Comma separate computer names by which to filter. nvarchar(512),


These names can contain wildcard characters. varchar(512), not null

IPADDRESSLIST Comma-separated IP list by which to filter. These names nvarchar(255),


can contain wildcard characters. varchar(255), not null

USERLIST Comma-separated user names by which to filter. These nvarchar(255),


names can contain wildcard characters. varchar(255), not null
110 Compliance Report data table
Compliance Report schema

Table 27-1 Compliance Report schema (continued)

Database Field Name Comment Data Type

SITELIST Comma-separated site names by which to filter. These nvarchar(255),


names can contain wildcard characters. varchar(255), not null

ENFORCERLIST Comma-separated Enforcer names by which to filter. nvarchar(255),


These names can contain wildcard characters. varchar(255), not null

REMOTEHOSTLIST Comma-separated remote computer names by which to nvarchar(255),


filter. These names can contain wildcard characters. varchar(255), not null

REMOTEIPLIST Comma-separated remote IP list by which to filter. These nvarchar(255),


names can contain wildcard characters. varchar(255), not null

LOCAL_PORT The port number. int, null

HACK_TYPE Possible values are as follows: int, null

0 = Process is not running

1 = Signature is out-of-date

2 = Recovery was tried

ACTION For Enforcer Client. varchar(32), not null

Possible values are as follows:

Authenticated

Disconnected

Passed

Rejected

Failed

ENFORCER_TYPE For Enforcer Client. tinyint, null

Possible values are as follows:

0 = Gateway Enforcer

1 = LAN Enforcer

2 = DHCP Enforcer

3 = Integrated Enforcer

4 = NAP Enforcer

5 = Peer-to-Peer Enforcer
Compliance Report data table 111
Compliance Report schema

Table 27-1 Compliance Report schema (continued)

Database Field Name Comment Data Type

OS_TYPE Possible values are as follows: int, null

600 = Windows Vista and Windows Server 2008

502 = Windows 2003 and Windows XP 64 bit

501 = Windows XP

500 = Windows 2000

400 = Windows NT

000 = Other

SORTORDER The log column to sort. varchar(32), not null

SORTDIR Possible values are as follows: varchar(5), not null

DESC = Descending

ASC = Ascending

LIMITROWS The number of rows to use for pagination. int, not null

USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null

REPORT_IDX Not used. int, not null

REPORTINPUTS Special parameters if a report needs them. nvarchar(64),


varchar(64), not null

USN A USN-based serial number; this ID is not unique. bigint, not null

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.

DELETED Deleted entry; tinyint, not null

0 = Not deleted

1 = Deleted

FULL_CHARTS An administrator-specified list of charts to include in varchar(255), not null


the Network Threat Protection Full Report.
112 Compliance Report data table
Compliance Report schema
Chapter 28
Computer Application data
table
This chapter includes the following topics:

■ Computer Application schema

Computer Application schema


Table 28-1 describes the database schema for computer application information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_COMPUTER_APPLICATION.

Table 28-1 Computer Application schema

Database Field Name Comment Data Type

AGENT_ID* The GUID of the agent. char(32), not null

DOMAIN_ID* The GUID of the domain to which the char(32), not null
agent belongs.

APP_HASH* The hash value of the learned char(32), not null


application record.

LOCATION_ID* The GUID of the location. char(32), not null

COMPUTER_ID The GUID of the computer. char(32), not null


114 Computer Application data table
Computer Application schema

Table 28-1 Computer Application schema (continued)

Database Field Name Comment Data Type

GROUP_ID The group GUID. char(32), not null

LAST_ACCESS_TIME The last access time of the application bigint, null


on the computer (in GMT).

USN The update serial number; used by bigint, not null


replication.

TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflict.

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

1 = Deleted

0 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260), varchar(260), null

RESERVED_BINARY varbinary(2000), null


Chapter 29
Data Handler data table
This chapter includes the following topics:

■ Data Handler schema

Data Handler schema


Table 29-1 describes the database schema for data handler information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_DATA_HANDLER.

Table 29-1 Data Handler schema

Database Field Name Comment Data Type

IDX* Primary Key. char(32), not null

TECH_ID Technology extension. varchar(255), not null

Possible values are as follows:

AvMan

LuMan

legacy

SEP
116 Data Handler data table
Data Handler schema

Table 29-1 Data Handler schema (continued)

Database Field Name Comment Data Type

LF_EXT File extension. varchar(255), not null

Possible values are as follows:

.dat

.AgentStatus

.SecurityRisk

.VirusScans

.VirusLogs

.Inventory

LF_SORT Sort files. tinyint, not null

Possible values are as follows:

0 = Ascending by file modification time

1 = Descending by file modification time

LF_HANDLER Classes that handle data files. varchar(255), not null

Possible values are as follows:

AvMan = com.sygate.scm.server.logreader.av.LogHandler

Legacy agentstatus =
com.sygate.scm.server.logreader.av.AgentStatusHandler

Legacy inventory =
com.sygate.scm.server.logreader.av.InventoryHandler

Legacy security and virus logs =


com.sygate.scm.server.logreader.av.LogHandler

STATE_HANDLER Classes that handle state files. varchar(255), not null

Possible values are as follows:

SEP = com.sygate.scm.server.statereader.sep.StateHandler

AvMan = com.sygate.scm.server.statereader.av.StateHandler

LuMan = com.sygate.scm.server.statereader.lu.StateHandler
Chapter 30
Enforcer Client Logs 1 and
2 data tables
This chapter includes the following topics:

■ Enforcer Client Logs 1 and 2 schema

Enforcer Client Logs 1 and 2 schema


Table 30-1 describes the database schema for the Enforcer Client logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_ENFORCER_CLIENT_LOG_1_LOG_IDX or
I_ENFORCER_CLIENT_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.

Table 30-1 Enforcer Client Logs 1 and 2 schema

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null
118 Enforcer Client Logs 1 and 2 data tables
Enforcer Client Logs 1 and 2 schema

Table 30-1 Enforcer Client Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

DOMAIN_ID Not used (logged as char(32), not null


'00000000000000000000000000000000')

SITE_ID The GUID of the site to which the log belongs. char(32), not null

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.

EVENT_ID No event IDs defined, logged as 0. int, not null

EVENT_TIME The event-generated time (in GMT). bigint, not null

ENFORCER_ID The GUID of the Enforcer. char(32), not null

ENFORCER_TYPE Possible values are as follows: tinyint, not null

0 = Gateway Enforcer

1 = LAN Enforcer

2 = DHCP Enforcer

3 = Integrated Enforcer

4 = NAP Enforcer

5 = Peer-to-Peer Enforcer

CLIENT_ID Not used; logged as a 0-length string. char(32), null

REMOTE_HOST The remote host name. varchar(256), null

ACTION The Enforcer's action on this client. It is a hard-coded varchar(256), null


English string that is used as a lookup

Possible values are as follows:

Authenticated = Agent's UID is correct

Rejected = Agent's UID is wrong or there's no agent


running

Disconnected = Agent disconnects from Enforcer or


Enforcer service stops

Passed = Agent has passed Host Integrity check

Failed = Agent has failed Host Integrity check


Enforcer Client Logs 1 and 2 data tables 119
Enforcer Client Logs 1 and 2 schema

Table 30-1 Enforcer Client Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

PERIOD The period in seconds before the Enforcer takes action int, null
on the client. Only valid when action is equal to Rejected
and Disconnected. For other actions, this field must be
0.

EVENT_DESC A description of the event. Usually, first line of the nvarchar(256),


description is treated as “summary.” varchar(256), null

REMOTE_HOST_MAC The remote host MAC address. varchar(17), null

REMOTE_HOST_INFO The remote host information. nvarchar(128),


varchar(128), null

EXTENDED_INFO nvarchar(1024),
varchar(1024), null

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 Peer-to-Peer Enforcer. nvarchar(260),


varchar(260), null

RESERVED_BINARY varbinary(2000), null

LOG_IDX* char(32), null


120 Enforcer Client Logs 1 and 2 data tables
Enforcer Client Logs 1 and 2 schema
Chapter 31
Enforcer Traffic Logs 1 and
2 data table
This chapter includes the following topics:

■ Enforcer Traffic Logs 1 and 2 schema

Enforcer Traffic Logs 1 and 2 schema


Table 31-1 describes the database schema for the Enforcer Traffic logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_ENFORCER_TRAFFIC_LOG_1_LOG_IDX or
I_ENFORCER_TRAFFIC_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.

Table 31-1 Enforcer Traffic Logs 1 and 2 schema

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null
122 Enforcer Traffic Logs 1 and 2 data table
Enforcer Traffic Logs 1 and 2 schema

Table 31-1 Enforcer Traffic Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

DOMAIN_ID Not used (logged as char(32), not null


'00000000000000000000000000000000')

SITE_ID The GUID of the site to which the log belongs. char(32), not null

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.

EVENT_ID An event ID from the Symantec Endpoint Protection int, null


agent.

Possible values are as follows:

17 = Incoming traffic blocked

18 = Outgoing traffic blocked

33 = Incoming traffic allowed

34 = Outgoing traffic allowed

EVENT_TIME The event-generated time (in GMT). bigint, not null

ENFORCER_ID The GUID of the Enforcer. char(32), not null

ENFORCER_TYPE Possible values are as follows: tinyint, not null

0 = Gateway Enforcer

1 = LAN Enforcer

2 = DHCP Enforcer

3 = Integrated Enforcer

4 = NAP Enforcer

5 = Peer-to-Peer Enforcer

CLIENT_ID Not used; logged as a 0-length string. char(32), null

LOCAL_HOST_IP The IP address of local computer (IPv4). bigint, not null

REMOTE_HOST_IP The IP address of remote computer (IPv4). bigint, not null

NETWORK_PROTOCOL The protocol type: Enum (OTHERS = 1; TCP = 2; UDP = tinyint, not null
3; ICMP = 4)

LOCAL_PORT The TCP/UDP port in the local computer (host int, not null
byte-order). It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.
Enforcer Traffic Logs 1 and 2 data table 123
Enforcer Traffic Logs 1 and 2 schema

Table 31-1 Enforcer Traffic Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

REMOTE_PORT The TCP/UDP port in the remote computer (host int, not null
byte-order). It is only valid on TSE_TRAFFIC_TCP and
TSE_TRAFFIC_UDP. Otherwise, it is always zero.

TRAFFIC_DIRECTION The direction of the traffic. Enum (unknown = 0; tinyint, not null
inbound = 1; outbound = 2)

BEGIN_TIME The start time of the Enforcer event. bigint, null

END_TIME The end time of the Enforcer event. bigint, null

BLOCKED Specifies if the traffic was blocked. tinyint, not null

Possible values are as follows:

0 = blocked

1 = Not blocked.
Note: The values in this table and those in the
AGENT_TRAFFIC_LOG_x tables are different.

TOTAL_BYTES The total length of all packets in the traffic. int, not null

REPETITION The number of attacks. When a hacker launches a mass int, null
attack, it may be damped to one event by the log system.

ALERT Reserved. tinyint, not null

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260),
varchar(260), null

RESERVED_BINARY varbinary(2000), null

LOG_IDX* char(32), null


124 Enforcer Traffic Logs 1 and 2 data table
Enforcer Traffic Logs 1 and 2 schema
Chapter 32
Enforcer System Logs 1 and
2 data tables
This chapter includes the following topics:

■ Enforcer System Logs 1 and 2 schema

Enforcer System Logs 1 and 2 schema


Table 32-1 describes the database schema for the Enforcer System logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_ENFORCER_SYSTEM_LOG_1_LOG_IDX or
I_ENFORCER_SYSTEM_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.

Table 32-1 Enforcer System Logs 1 and 2 schema

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null
126 Enforcer System Logs 1 and 2 data tables
Enforcer System Logs 1 and 2 schema

Table 32-1 Enforcer System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

SITE_ID The GUID of the site to which the log belongs. char(32), not null

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
Enforcer System Logs 1 and 2 data tables 127
Enforcer System Logs 1 and 2 schema

Table 32-1 Enforcer System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

EVENT_ID int, null


128 Enforcer System Logs 1 and 2 data tables
Enforcer System Logs 1 and 2 schema

Table 32-1 Enforcer System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

An event ID from the Symantec Endpoint Protection


agent (in hex).

Possible values are as follows:

0x101 = Connected to Symantec Endpoint Protection


Manager

0x102 = Lost connection to Symantec Endpoint


Protection Manager

0x103 = Applied a policy that was downloaded from


Symantec Endpoint Protection Manager

0x104 = Failed to apply a policy that was downloaded


from Symantec Endpoint Protection Manager

0x107 = Applied management server configuration

0x108 = Failed to apply the management server


configuration

0x110 = Registered to the NAP management server

0x111 = Unregistered from the NAP management server

0x112 = Failed to register to the NAP management


server

0x201 = Enforcer started

0x202 = Enforcer stopped

0x203 = Enforcer paused

0x204 = Enforcer resumed

0x205 = Enforcer disconnected from server

0x301 = Enforcer failover enabled

0x302 = Enforcer failover disabled

0x303 = Enforcer in standby mode

0x304 = Enforcer in primary mode

0x305 = Enforcer short

0x306 = Enforcer loop

0x401 = Forward engine pause

0x402 = Forward engine start

0x403 = DNS Enforcer enabled


Enforcer System Logs 1 and 2 data tables 129
Enforcer System Logs 1 and 2 schema

Table 32-1 Enforcer System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

0x404 = DNS Enforcer disabled

0x405 = DHCP Enforcer enabled

0x406 = DHCP Enforcer disabled

0x407 = Allow all enabled

0x408 = Allow all disabled

0x501 = Seat number change

0x601 = Failed to create a policy parser

0x602 = Failed to import a policy that was downloaded


from Symantec Endpoint Protection Manager

0x603 = Failed to export a policy that was downloaded


from Symantec Endpoint Protection Manager

0x701 = Incorrect customized attribute

EVENT_TIME The event-generated time (in GMT). bigint, not null

ENFORCER_ID GUID of the Enforcer char(32), not null

ENFORCER_TYPE Possible values are as follows: tinyint, not null

0 = Gateway Enforcer

1 = LAN Enforcer

2 = DHCP Enforcer

3 = Integrated Enforcer

4 = NAP Enforcer

5 = Peer-to-Peer Enforcer

SEVERITY The type of event. int, not null

Possible values are as follows:

0 = INFO

1 = WARNING

2 = ERROR

3 = FATAL

EVENT_DESC A description of the event. Usually, the first line of the nvarchar(256),
description is treated as “summary". varchar(256), null
130 Enforcer System Logs 1 and 2 data tables
Enforcer System Logs 1 and 2 schema

Table 32-1 Enforcer System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260),
varchar(260), null

RESERVED_BINARY varbinary(2000), null

LOG_IDX* The log index unique ID. char(32), null


Chapter 33
Firewall Report data table
This chapter includes the following topics:

■ Firewall Report schema

Firewall Report schema


Table 33-1 describes the database schema for firewall report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_FIREWALLREPORT.

Table 33-1 Firewall Report schema

Database Field Name Comment Data Type

FIREWALLFILTER_IDX* Primary Key. char(32), not null

USER_ID The GUID of the user who created this char(32), not null
filter.

FILTERNAME The filter name. nvarchar(255), varchar(255), not null

STARTDATEFROM The start date. datetime, not null

STARTDATETO The end date. datetime, not null


132 Firewall Report data table
Firewall Report schema

Table 33-1 Firewall Report schema (continued)

Database Field Name Comment Data Type

RELATIVEDATETYPE Possible values are as follows: int, not null

0 = past week

1 = past month

2 = past three months

3 = past year

4 = past 24 hours

5 = current month

FIREWALLTYPE Possible values are as follows: int, null

1 = Traffic

2 = Packets

SEVERITY Possible values are as follows: int, null

1 = Critical

5 = Major

9 = Minor

13 = Info

EVENTTYPE Events for Traffic. int, null

Possible values are as follows:

307 = Ethernet packet

306 = ICMP packet

308 = IP packet

303 = Ping request

301 = TCP initiated

304 = TCP completed

302 = UDP datagram

305 = Other

Events for Packet:

401 = Raw Ethernet


Firewall Report data table 133
Firewall Report schema

Table 33-1 Firewall Report schema (continued)

Database Field Name Comment Data Type

BLOCKED Possible values are as follows: int, null

1 = Blocked

0 = Not blocked

PROTOCOL Possible values are as follows: int, null

1 = Other

2 = TCP

3 = UDP

4 = ICMP

DIRECTION Possible values are as follows: int, null

1 = Inbound

2 = Outbound

0 = Unknown

LOCALPORT The port number. int, null

SITELIST Comma-separated site names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

SERVERGROUPLIST Comma-separated domain names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

CLIENTGROUPLIST Comma-separated group names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

PARENTSERVERLIST Comma-separated server names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

COMPUTERLIST Comma-separated computer names nvarchar(512), varchar(512), not null


by which to filter. These names can
contain wildcard characters.

IPADDRESSLIST Comma-separated IP list by which to nvarchar(255), varchar(255), not null


filter. These names can contain
wildcard characters.
134 Firewall Report data table
Firewall Report schema

Table 33-1 Firewall Report schema (continued)

Database Field Name Comment Data Type

REMOTEHOSTLIST Comma-separated remote computer nvarchar(255), varchar(255), not null


names by which to filter.

REMOTEIPADDRLIST Comma-separated remote IP list by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

USERLIST Comma-separated user names by nvarchar(255), varchar(255), not null


which to filter. These names can
contain wildcard characters.

SORTORDER The column in the table to sort by. varchar(32), not null

SORTDIR The direction in which to sort. varchar(5), not null

Possible values are as follows:

DESC = Descending

ASC = Ascending

LIMITROWS The number of rows to use for int, not null


pagination.

USERELATIVE Use relative dates ('on') or absolute char(2), not null


dates.

REPORT_IDX Not used. int, not null

REPORTINPUTS Special parameters if report needs nvarchar(64), varchar(64), not null


them

USN A USN-based serial number; this ID bigint, not null


is not unique.

TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.

DELETED Delete row. tinyint, not null

0 = Not deleted

1 = Deleted

FULL_CHARTS Not used. varchar(255), not null


Chapter 34
GUI Parameters data table
This chapter includes the following topics:

■ GUI Parameters schema

GUI Parameters schema


Table 34-1 describes the database schema for GUI parameters information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_GUIPARMS.

Table 34-1 GUI Parameters schema

Database Field Name Comment Data Type

GUIPARMS_IDX* Primary Key. int, not null

PARAMETER The parameter name. varchar(255), not null

VALUE The parameter value. nvarchar(255), varchar(255), not null

USN A USN-based serial number; this ID bigint, not null


is not unique.

TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
136 GUI Parameters data table
GUI Parameters schema

Table 34-1 GUI Parameters schema (continued)

Database Field Name Comment Data Type

DELETED Delete row: tinyint, not null

0 = Not deleted

1 = Deleted
Chapter 35
History data table
This chapter includes the following topics:

■ History schema

History schema
Table 35-1 describes the database schema for history information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_HISTORY.

Table 35-1 History schema

Database Field Name Comment Data Type

HISTORY_IDX* Primary Key, Index. char(32), not null

HISTORYCONFIG_IDX Pointer to the History Configuration char(32), not null


table.

EVENT_DATETIME The snapshot time in GMT. bigint, not null

STAT_TYPE The kind of data; a hard-coded varchar(64), not null


English key.

TARGET The data. nvarchar(256), varchar(256), not null

STATISTIC Summary statistic. nvarchar(256), varchar(256), not null


138 History data table
History schema
Chapter 36
History Configuration data
table
This chapter includes the following topics:

■ History Configuration schema

History Configuration schema


Table 36-1 describes the database schema for history configuration information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_HISTORYCONFIG.

Table 36-1 History Configuration schema

Database Field Name Comment Data Type

HISTORYCONFIG_IDX* Primary Key. char(32), not null

USER_ID The GUID of the user who created this scheduled char(32), not null
report.

TZ_OFFSET The time zone that is offset from when the int, not null
administrator creates the scheduled report so that data
can be formatted to the administrator's local time.

FILTERNAME The filter that is used by this scheduled report. nvarchar(255),


varchar(255), not null
140 History Configuration data table
History Configuration schema

Table 36-1 History Configuration schema (continued)

Database Field Name Comment Data Type

REPORT_IDX varchar(10), not null


History Configuration data table 141
History Configuration schema

Table 36-1 History Configuration schema (continued)

Database Field Name Comment Data Type

Format is Reporttype-number. For example, I-0 is the


Virus Definitions Distribution.

Possible values are as follows:

I = Computer Status Report

0 = Virus Definitions Distribution

1 = Computers Not Checked Into Server

2 = Symantec Endpoint Protection Product Versions

3 = Intrusion Prevention Signature Distribution

4 = Client Inventory

5 = Compliance Status Distribution

6 = Client Online Status

7 = Clients With Latest Policy

8 = Client Count by Group

9 = Security Status Summary

10 = Protection Content Versions

11 =Client Migration

100 = Client Software Rollout (Snapshots)

101 = Clients Online/Offline Over Time (Snapshots)

102 = Clients With Latest Policy Over Time (Snapshots)

103 = Non-Compliant Clients Over Time (Snapshots)

104 = Virus Definition Rollout (Snapshots)

A = Audit Report

0 = Policies Used

B = Application and Device Control Report

0 = Top Groups With Most Alerted Application Control


Logs

1 = Top Targets Blocked

2 = Top Devices Blocked

C = Compliance Report

0 = Network Compliance Status


142 History Configuration data table
History Configuration schema

Table 36-1 History Configuration schema (continued)

Database Field Name Comment Data Type

1 = Compliance Status

2 = Clients by Compliance Failure Summary

3 = Compliance Failure Details

4 = Non-compliant Clients by Location

F = Network Threat Protection Report

0 = Top Targets Attacked

1 = Top Sources of Attack

2 = Top Types of Attack

3 = Top Blocked Applications

4 = Attacks Over Time

5 = Security Events by Severity

6 = Blocked Applications Over Time

7 = Traffic Notifications Over Time

8 = Top Traffic Notifications

9 = Full Report

R = Risk Report

0 = Infected and At Risk Computers

1 = Detection Action Summary

2 = Risk Detections Count

3 = New Risks Detected in the Network

4 = Top Risk Detections Correlation

5 = Risk Distribution Summary

6 = Risk Distribution Over Time

8 = Proactive Threat Detection Results

9 = Proactive Threat Distribution

10 = Proactive Threat Detection Over Time

11 = Action Summary for Top Risks

12 = Number of Notifications

14 = Number of Notifications Over Time

13 = Weekly Outbreaks
History Configuration data table 143
History Configuration schema

Table 36-1 History Configuration schema (continued)

Database Field Name Comment Data Type

7 = Comprehensive Risk Report

S = Scan Report

0 = Scan Statistics Histogram

1 = Computers by Last Scan Time

2 = Computers Not Scanned

Y = System Report

0 = Top Clients That Generate Errors

1 = Top Servers That Generate Errors

2 = Top Enforcers That Generate Errors

3 = Database Replication Failures Over Time

4 =Site Status Report

STARTTIME When to start generating the report; this establishes datetime, not null
its scheduled time within the repeat schedule.

LASTRUN When the report was last generated ( in GMT). bigint, not null

RUNHOURS Repeat schedule for this report in hours, for example: int, not null

1 = Every 1 hour

24 = Every 1 day

168 = Every week

720 = Every month

NAME The name of this scheduled report. nvarchar(255),


varchar(255), not null

EMAIL A comma-separated list of email addresses to send the nvarchar(255),


report to. varchar(255), not null

DESCRIPTION Administrator-provided description for this report. nvarchar(255),


varchar(255), not null

DISABLED Specifies whether the scheduled report is disabled or tinyint, not null
not.

Possible values are as follows:

0 = No

1 = Yes
144 History Configuration data table
History Configuration schema

Table 36-1 History Configuration schema (continued)

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = Not Deleted

1 = Deleted
Chapter 37
Home Page Configuration
data table
This chapter includes the following topics:

■ Home Page Configuration schema

Home Page Configuration schema


Table 37-1 describes the database schema for home page configuration
information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_HOMEPAGECONFIG.

Table 37-1 Home Page Configuration schema

Database Field Name Comment Data Type

HOMEPAGECONFIG_IDX* Primary Key. char(32), not null

USER_NAME The Admin GUID. char(32), not null

PARAMETER The parameter name. varchar(255), not null

VALUE The parameter value. nvarchar(255),


varchar(255), not null

USN A USN-based serial number; this ID is not unique. bigint, not null
146 Home Page Configuration data table
Home Page Configuration schema

Table 37-1 Home Page Configuration schema (continued)

Database Field Name Comment Data Type

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = Not Deleted

1 = Deleted
Chapter 38
HPP Alerts data table
This chapter includes the following topics:

■ HPP Alerts schema

HPP Alerts schema


Table 38-1 describes the database schema for the TruScan proactive threat scan
event information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_HPP_ALERTS.

Table 38-1 HPP Alerts schema

Database Field Name Comment Data Type

IDX* Primary Key. char(32), not null

SENSITIVITY The engine sensitivity setting that tinyint, not null


produced the detection (0...100).

DETECTION_SCORE The score of the detection (0...100). tinyint, not null

COH_ENGINE_VERSION The version of the TruScan engine. varchar(64), not null


148 HPP Alerts data table
HPP Alerts schema

Table 38-1 HPP Alerts schema (continued)

Database Field Name Comment Data Type

DIS_SUBMIT The recommendation of whether or tinyint, not null


not this detection should be
submitted to Symantec.

Possible values are as follows:

0 = No

1 = Yes

WHITELIST_REASON The reason for whitelisting. int, not null

Possible values are as follows:

0 = Not on the permitted application


list

100 = Symantec permitted application


list

101 = Administrator permitted


application list

102 = User permitted application list

USN A USN-based serial number; this ID bigint, not null


is not unique.

TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = Not Deleted

1 = Deleted
Chapter 39
HPP Application data table
This chapter includes the following topics:

■ HPP Application schema

HPP Application schema


Table 39-1 describes the database schema for information for the applications
that TruScan proactive threat scans detect.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_HPP_APPLICATION.

Table 39-1 HPP Application schema

Database Field Name Comment Data Type

APP_IDX* Primary Key. char(32), not null

APP_HASH The hash for this application. varchar(64), not null

HASH_TYPE The hash algorithm that was used. tinyint, not null

Possible values are as follows:

0 = MD5

1 = SHA-1

2 = SHA-256

COMPANY_NAME The company name. nvarchar(260), varchar(260), not null


150 HPP Application data table
HPP Application schema

Table 39-1 HPP Application schema (continued)

Database Field Name Comment Data Type

APP_NAME The application name. nvarchar(260), varchar(260), not null

APP_VERSION The application version. nvarchar(256), varchar(256), not null

APP_TYPE The application type. int, not null

Possible values are as follows:

0 = Trojan horse worm

1 = Trojan horse worm

2 = Key logger

100 = Remote control

FILE_SIZE The file size. bigint, not null

DETECTION_TYPE The detection type. tinyint, not null

Possible values are as follows:

0 = heuristic

1 = commercial application

USN A USN-based serial number; this ID bigint, not null


is not unique.

TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = Not Deleted

1 = Deleted

HELP_VIRUS_IDX Foreign key to VIRUS table, which char(32), null


provides a help ID for online
Symantec write-up.
Chapter 40
Identity Map data table
This chapter includes the following topics:

■ Identity Map schema

Identity Map schema


Table 40-1 describes the database schema for identity map information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_IDENTITY_MAP.

Table 40-1 Identity Map schema

Database Field Name Comment Data Type

ID* The GUID of an object. char(32), not null

NAME The name of the object. nvarchar(2000), varchar(2000), null

TYPE The Object Type Name. varchar(256), null

DOMAIN_ID The GUID of the domain. char(32), null

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null


152 Identity Map data table
Identity Map schema

Table 40-1 Identity Map schema (continued)

Database Field Name Comment Data Type

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260), varchar(260), null

RESERVED_BINARY varbinary(2000), null


Chapter 41
Inventory Current Risk data
table
This chapter includes the following topics:

■ Inventory Current Risk schema

Inventory Current Risk schema


Table 41-1 describes the database schema for inventory current risk information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_INVENTORYCURRENTRISK.

Table 41-1 Inventory Current Risk schema

Database Field Name Comment Data Type

COMPUTER_IDX* Foreign key to char(32), not null


SEM_COMPUTER.COMPUTER_ID.

ALERT_EVENT_IDX* Foreign key to ALERTS.IDX. char(32), not null

USN A USN-based serial number; this ID bigint, not null


is not unique.

TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.
154 Inventory Current Risk data table
Inventory Current Risk schema

Table 41-1 Inventory Current Risk schema (continued)

Database Field Name Comment Data Type

DELETED Deleted row: tinyint, not null

0 = Not Deleted

1 = Deleted
Chapter 42
Inventory Current Virus
data table
This chapter includes the following topics:

■ Inventory Current Virus schema

Inventory Current Virus schema


Table 42-1 describes the database schema for inventory current virus information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_INVENTORYCURRENTVIRUS.

Table 42-1 Inventory Current Virus schema

Database Field Name Comment Data Type

COMPUTER_IDX* Foreign key to SEM_COMPUTER.COMPUTER_ID. char(32), not null

ALERT_EVENT_IDX* Foreign key to ALERTS.IDX. char(32), not null

USN A USN-based serial number; this ID is not unique. bigint, not null

TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.
156 Inventory Current Virus data table
Inventory Current Virus schema

Table 42-1 Inventory Current Virus schema (continued)

Database Field Name Comment Data Type

DELETED Deleted row tinyint, not null

0 = Not Deleted

1 = Deleted
Chapter 43
Inventory Report data table
This chapter includes the following topics:

■ Inventory Report schema

Inventory Report schema


Table 43-1 describes the database schema for inventory report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_INVENTORYREPORT.

Table 43-1 Inventory Report schema

Database Field Name Comment Data Type

INVENTORYFILTER_IDX* Primary Key. char(32), not null

USER_ID The administrator GUID. char(32), not null

FILTERNAME User-specified name for this saved filter nvarchar(255), varchar(255),


not null

LASTCHECKINTIME The last time of check in with management server. datetime, not null
158 Inventory Report data table
Inventory Report schema

Table 43-1 Inventory Report schema (continued)

Database Field Name Comment Data Type

LASTSCANTIME The last time that the computer was scanned. int, null

Possible values are as follows:

0 = past week

1 = past month

2 = past three months

3 = past year

4 = past 24 hours

5 = current month

RELATIVEDATETYPE The last check in time, if relative filtering was int, not null
used.

Possible values are as follows:

0 = past week

1 = past month

2 = past three months

3 = past year

4 = past 24 hours

5 = current month

OPERATOR Not used. tinyint, not null

PATTERN_IDX A hard-coded English string that is used as key varchar(255), not null
(filters for Antivirus signature version).

Possible values are as follows:

WITHIN_RELATIVE_30 = Within the last 30 days

WITHIN_RELATIVE_90 = Within the last 90 days

OUTSIDE_RELATIVE_30 = Older than the last 30


days

OUTSIDE_RELATIVE_90 = Older than the last 90


days

or a virus definition revision that results in an <


= query on that revision.

PRODUCTVERSION The product version by which to filter. varchar(32), not null


Inventory Report data table 159
Inventory Report schema

Table 43-1 Inventory Report schema (continued)

Database Field Name Comment Data Type

PROFILE_VERSION The profile version by which to filter varchar(64), not null

IDS_VERSION The intrusions detection system signature version varchar(64), not null
by which to filter.

GOOD Not used. varchar(5), not null

LICENSE_STATUS Not used. tinyint, null

STATUS Possible values are as follows: tinyint, null

1 = online

0 = offline

127 = No filter (all)

ONOFF Auto-Protect Status. tinyint, null

Possible values are as follows:

0 = filter for off

127 = No filter (all)

TAMPER_ONOFF Tamper Protection Status. tinyint, null

Possible values are as follows:

0 = filter for off

127 = No filter (all)

REBOOT_REQUIRED Restart Required Status. tinyint, null

Possible values are as follows:

1 = filter for needs restart

127 = No filter (all)

AVENGINE_ONOFF Antivirus Engine Status. tinyint, null

Possible values are as follows:

0 = filter for off

127 = No filter (all)


160 Inventory Report data table
Inventory Report schema

Table 43-1 Inventory Report schema (continued)

Database Field Name Comment Data Type

TPM_DEVICE TPM device installed. tinyint, null

Possible values are as follows:

1 = filters on device is installed

127 = No filter (all)

SERVERGROUPLIST A comma-separated list of domain names by nvarchar(255), varchar(255),


which to filter. These names can contain wildcard not null
characters.

CLIENTGROUPLIST A comma-separated list of group names by which nvarchar(255), varchar(255),


to filter. These names can contain wildcard not null
characters.

PARENTSERVERLIST A comma-separated list of server names by which nvarchar(255), varchar(255),


to filter. These names can contain wildcard not null
characters.

SITELIST A comma-separated list of site names by which nvarchar(255), varchar(255),


to filter. These names can contain wildcard not null
characters.

R_OS_TYPE Possible values are as follows: int, null

600 = Windows Vista and Windows Server 2008

502 = Windows 2003 and Windows XP 64 bit

501 = Windows XP

500 = Windows 2000

400 = Windows NT

000 = Other

-1 = No filter (all)

HI_STATUS Filters on the following compliance statuses: tinyint, null

0 = Fail

1 = Success

2 = Pending

3 = Disabled

4 = Ignore

127 = No filter (all)


Inventory Report data table 161
Inventory Report schema

Table 43-1 Inventory Report schema (continued)

Database Field Name Comment Data Type

HI_REASONCODE Filters on the following reasons: int, null

0 = Pass

101 = Antivirus version is out-of-date

102 = Antivirus is not running

103 = Script failed

104 = Check is incomplete

105 = Check is disabled

127 = Location changed

- 1 = No filter (all)

SERVICE_PACK OS service pack or % for no filter (all). nvarchar(64), varchar(64), not


null

WORSTINFECTION_IDX Not used. int, null

COMPUTERLIST A comma-separated, wild-carded list of computer nvarchar(512), varchar(512),


names by which to filter. These names can contain not null
wildcard characters.

IDADDRESSLIST A comma-separated, wild-carded list of IP nvarchar(255), varchar(255),


addresses by which to filter. These names can not null
contain wildcard characters.

USERLIST A comma-separated, wild-carded list of user nvarchar(255), varchar(255),


names by which to filter. These names can contain not null
wildcard characters.

INFECTED On = filter for infected machines varchar(2), not null

SORTORDER The column to use to sort for the Computer Status varchar(32), not null
log.

SORTDIR Ascending or descending. varchar(5), not null

FILVIEW Not used. varchar(16), not null

CLIENTTYPE Not used. varchar(32), not null

LIMITROWS The number of rows to use for pagination. int, not null

USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null

REPORT_IDX Not used. int, not null


162 Inventory Report data table
Inventory Report schema

Table 43-1 Inventory Report schema (continued)

Database Field Name Comment Data Type

REPORTINPUTS Special parameters if a report needs them. nvarchar(64), varchar(64), not


null

USN A USN-based serial number; this ID is not unique. bigint, not null

TIME_STAMP The time when this database record was entered bigint, not null
or modified in the database, in milliseconds since
1970.

DELETED Deleted row tinyint, not null

0 = Not Deleted

1 = Deleted

FIREWALL_ONOFF Network Threat Protection Status. tinyint, null

Possible values are as follows:

0 = filter for off

127 = No filter (all)


Chapter 44
LAN Device Detected data
table
This chapter includes the following topics:

■ LAN Device Detected schema

LAN Device Detected schema


The LAN Device Detected data table is not used in Symantec Network Access
Control.
Table 44-1 describes the database schema for LAN Device Detected information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_LAN_DEVICE_DETECTED.

Table 44-1 LAN Device Detected schema

Database Field Name Comment Data Type

LAN_DEVICE_ID The GUID of the device. char(32), not null

AGENT_ID The GUID of the agent. char(32), not null

COMPUTER_ID The GUID of the client computer. char(32), not null

HASH* Link with the computer char(32), not null


HARDWARE_KEY, Group GUID.
164 LAN Device Detected data table
LAN Device Detected schema

Table 44-1 LAN Device Detected schema (continued)

Database Field Name Comment Data Type

MAC_ADDRESS* The MAC address of the device. varchar(18), not null

IP_ADDRESS The IP Address of the device. bigint, not null

DEVICE_DETECTED_TIME The GUID of the domain. bigint, null

ALERT Reserved. tinyint, null

SEND_SNMP_TRAP Reflects the send SNMP trap action. tinyint, null


SEND_SNMP_TRAP is true if send is
true.

USN The update serial number; used by bigint, not null


replication.

TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflict.

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

1 = Deleted

0 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 varchar(260), null

RESERVED_BINARY varbinary(2000), null


Chapter 45
LAN Device Excluded data
table
This chapter includes the following topics:

■ LAN Device Excluded schema

LAN Device Excluded schema


The LAN Device Excluded data table is not used in Symantec Network Access
Control.
Table 45-1 describes the database schema for LAN Device Excluded information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_LAN_DEVICE_EXCLUDED.

Table 45-1 LAN Device Excluded schema

Database Field Name Comment Data Type

EXCLUDED_ID* The GUID of the record. char(32), not null

HASH Link with the computer char(32), not null


HARDWARE_KEY, Group GUID.

EXCLUDE_MODE tinyint, not null

MAC_ADDRESS The MAC address of the device. varchar(18), null


166 LAN Device Excluded data table
LAN Device Excluded schema

Table 45-1 LAN Device Excluded schema (continued)

Database Field Name Comment Data Type

IP_ADDRESS The IP Address of the device. bigint, null

SUBNET_MASK The subnet mask of the device. bigint, null

IP_RANGE_START The start of IP Address range. bigint, null

IP_RANGE_END The end of IP Address range. bigint, null

USN The update serial number; used by bigint, not null


replication.

TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve merge
conflicts.

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

0 = Deleted

1 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 varchar(260), null

RESERVED_BINARY varbinary(2000), null


Chapter 46
Legacy Agent data table
This chapter includes the following topics:

■ Legacy Agent schema

Legacy Agent schema


The Legacy Agent data table is not used in Symantec Network Access Control.
Table 46-1 describes the database schema for legacy agent information, which is
used for product migration.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_LEGACY_AGENT.

Table 46-1 Legacy Agent schema

Database Field Name Comment Data Type

LEGACY_AGENT_ID* The agent ID from a version 5.x agent. char(32), not null
Primary Key.

GROUP_PATH The group full path in SEM5. char(260), not null

POLICY_MODE User/Computer mode. int, not null

LAN_SENSOR If the Agent is a LAN_SENSOR. int, not null

CLIENT_ID The GUID in the SEM_CLIENT table. char(32), not null


168 Legacy Agent data table
Legacy Agent schema

Table 46-1 Legacy Agent schema (continued)

Database Field Name Comment Data Type

COMPUTER_ID The GUID in the SEM_COMPUTER char(32), not null


table.

AGENT_ID The GUID in the SEM_AGENT table. char(32), not null

USN Update serial number; used by bigint, not null


replication.

TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve merge
conflicts.

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

1 = Deleted

0 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260), varchar(260), null

RESERVED_BINARY varbinary(2000), null


Chapter 47
Local Metadata data table
This chapter includes the following topics:

■ Local Metadata schema

Local Metadata schema


Table 47-1 describes the database schema for local metadata information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_LOCAL_METADATA.

Table 47-1 Local Metadata schema

Database Field Name Comment Data Type

ID* The GUID. char(32), not null

TYPE The type of local_metadata. varchar(256), null

Supports only SemLocalSettings at


this moment.

CHECKSUM The checksum of the XML content. char(32), null

CONTENT The XML content of the schema image, null


object.
170 Local Metadata data table
Local Metadata schema

Table 47-1 Local Metadata schema (continued)

Database Field Name Comment Data Type

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

0 = Deleted

1 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260), varchar(260), null

RESERVED_BINARY varbinary(2000), null


Chapter 48
Log Configuration data
table
This chapter includes the following topics:

■ Log Configuration schema

Log Configuration schema


Table 48-1 describes the database schema for log configuration information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_LOG_CONFIG.
172 Log Configuration data table
Log Configuration schema

Table 48-1 Log Configuration schema

Database Field Name Comment Data Type

LOG_TYPE* Type of the logs. int, not null

Possible values are as follows:

101 = SERVER_SYSTEM_LOG

102 = SERVER_ADMIN_LOG

103 = SERVER_POLICY_LOG

104 = SERVER_CLIENT_LOG

105 = SERVER_ENFORCER_LOG

201 = AGENT_SYSTEM_LOG

202 = AGENT_SECURITY_LOG

203 = AGENT_TRAFFIC_LOG

204 = AGENT_PACKET_LOG

205 = AGENT_BEHAVIOR_LOG

301 = ENFORCER_SYSTEM_LOG

302 = ENFORCER_CLIENT_LOG

303 = ENFORCER_TRAFFIC_LOG

TABLE_LIST The name of the tables to switch logs. varchar(250), not null

THRESHOLD The threshold of the log count. int, not null

EXPIRATION The expiration date of the logs. int, not null

CURRENT_TABLE The current log table name. varchar(60), not null

CURRENT_ROWS The current log count in the log table. int, not null

SWITCH_TIME The last log switch time. bigint, null

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null


Log Configuration data table 173
Log Configuration schema

Table 48-1 Log Configuration schema (continued)

Database Field Name Comment Data Type

RESERVED_varchar1 nvarchar(260), varchar(260), null

RESERVED_BINARY varbinary(2000), null


174 Log Configuration data table
Log Configuration schema
Chapter 49
Network Scan data table
This chapter includes the following topics:

■ Network Scan schema

Network Scan schema


Table 49-1 describes the database schema for network scan information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_NETWORK_SCAN.

Table 49-1 Network Scan schema

Database Field Name Comment Data Type

ID* The GUID of the network scan. char(32), not null

DESCRIPTION An optional description of the nvarchar(512), null


network scan.

SCAN_TIME The time when the network scan is bigint, not null
added into the database, in
milliseconds since 1970.

ADMIN_ID The administrator who starts the char(32), not null


network scan.

USN The update serial number; used by bigint, not null


replication.
176 Network Scan data table
Network Scan schema

Table 49-1 Network Scan schema (continued)

Database Field Name Comment Data Type

TIME_STAMP The time when the command was bigint, not null
added into the database, in
milliseconds since 1970.

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

1 = Deleted

0 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 varchar(260), null

RESERVED_BINARY varbinary(1000), null


Chapter 50
Network Scan Result data
table
This chapter includes the following topics:

■ Network Scan Result schema

Network Scan Result schema


Table 50-1 describes the database schema for network scan result information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_NETWORK_SCAN_RESULT.

Table 50-1 Network Scan Result schema

Database Field Name Comment Data Type

ID* The GUID of the network scan. char(32), not null

IP_ADDR The IP address of scanned computer. bigint, not null

COMPUTER_NAME The computer name of scanned nvarchar(512), null


computer if the name can be resolved.

DESCRIPTION The computer’s operating system, the nvarchar(512), null


operating system version, and the
platform.

SOFTWARE The name of the detected software. nvarchar(512), null


178 Network Scan Result data table
Network Scan Result schema

Table 50-1 Network Scan Result schema (continued)

Database Field Name Comment Data Type

CLIENT_ID The GUID in the SEM_CLIENT table. char(32), null

STATUS The scan status code of the client. tinyint, not null

USN The update serial number; used by bigint, not null


replication.

TIME_STAMP The time when the command is added bigint, not null
into the database, in milliseconds
since 1970.

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

1 = Deleted

0 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 varchar(260), null

RESERVED_BINARY varbinary(1000), null


Chapter 51
Notification data table
This chapter includes the following topics:

■ Notification schema

Notification schema
Table 51-1 describes the database schema for notification information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_NOTIFICATION.

Table 51-1 Notification schema

Database Field Name Comment Data Type

NOTAG_IDX* Primary Key, Index of notification. char(32), not null


180 Notification data table
Notification schema

Table 51-1 Notification schema (continued)

Database Field Name Comment Data Type

TYPE Possible values are as follows: varchar(30), not null

VO = Risk outbreak

SO = Outbreak on single computers

VM = Outbreak by number of computers

1V = Single risk event

NV = New risk detected

ID = Virus definitions out-of-date

AF = Authentication failure

AFS = Authentication failure on a single server

SE = System event

CS = Client security alert

CSS = Client security alert on individual computers

CSM = Client security alert by number of computers

LA = New learned application

CL = Client list changed

DF = Server health

UM = Unmanaged computers

NS = New software package

ED = Enforcer is down

WL = Forced or Commercial application detected

USER_ID The administrator GUID. char(32), not null

TZ_OFFSET The time zone when the administrator created the int, not null
notification so that emailed reports can display dates
in the administrator's local time zone.

SERVERGROUP The name(s) of the server group(s) to which this nvarchar(255),


notification applies. A comma-separated list that allows varchar(255), not null
wildcard characters.

CLIENTGROUP The name(s) of the client group(s) to which this nvarchar(255),


notification applies. A comma-separated list that allows varchar(255), not null
wildcard characters.
Notification data table 181
Notification schema

Table 51-1 Notification schema (continued)

Database Field Name Comment Data Type

PARENTSERVER The name(s) of the parent server(s) to which this nvarchar(255),


notification applies. A comma-separated list that allows varchar(255), not null
wildcard characters.

COMPUTER The name(s) of the computer(s) to which this nvarchar(255),


notification applies. varchar(255), not null

VIRUS The name(s) of the virus(es) to which this notification nvarchar(255),


applies. A comma-separated list that allows wildcard varchar(255), not null
characters.

SOURCE The scan to which this notification applies. A varchar(255), not null
hard-coded English string that is used as key.

Possible values are as follows:

% = all

Scheduled Scan

Manual Scan

Real Time Scan

Heuristic Scan

Console

Definition downloader

System

Startup Scan

Idle Scan

Manual Quarantine
182 Notification data table
Notification schema

Table 51-1 Notification schema (continued)

Database Field Name Comment Data Type

ACTACTION Possible values are as follows: varchar(255), not null

% = No filter (all)

1 = Quarantined

3 = Deleted

4 = Left alone

5 = Cleaned

6 = Cleaned or macros deleted

14 = Pending repair

15 = Partially repaired

16 = Process termination pending restart

17 = Excluded

19 = Cleaned by deletion

20 = Access denied

21 = Process terminated

22 = No repair available

23 = All actions failed

98 = Suspicious

HYPERLINK2 The hyperlink used to generate report. nvarchar(255),


varchar(255), not null

NTIMES The number of occurrences that must occur to trigger int, not null
this notification.

XMINUTES The time window in which ntimes events must occur int, not null
to trigger the notification.

EMAIL A comma-separated email list to send email to when nvarchar(255),


this notification is triggered. varchar(255), not null

LASTRUN The time stamp when this notification was last bigint, not null
analyzed.

TRIGGERED The time when the alert was last triggered. bigint, not null

LASTRUN_DATA Any extra data that is needed to give details in the varchar(50), not null
notification email.
Notification data table 183
Notification schema

Table 51-1 Notification schema (continued)

Database Field Name Comment Data Type

CATEGORY The virus category to which this notification applies. varchar(10), not null

Possible values are as follows:

>= -1 is no filter (all)

>= 1 filters for Category 1 (Very Low) and above

>= 2 filters for Category 2 (Low) and above

>= 3 filters for Category 3 (Moderate) and above

>= 4 filters for Category 4 (Severe) and above

>= 5 filters for Category 5 (Very Severe)

= -1 filters for unknown

USN A USN-based serial number; this ID is not unique. bigint, not null

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = Not Deleted

1 = Deleted

SYSTEM_EVENT Which groups of system events. int, not null

SECURITY_EVENT Which groups of security events. int, not null

DAMPER The minimum quiet time between alerts in minutes; 0 int, not null
means autodamper, which is 60 minutes

BATCH_FILE_NAME The batch file or executable to be executed when the nvarchar(64),


notification is triggered. varchar(64), not null

NAME The name of notification configuration. nvarchar(255),


varchar(255), not null
184 Notification data table
Notification schema
Chapter 52
Notification Alerts data
table
This chapter includes the following topics:

■ Notification Alerts schema

Notification Alerts schema


Table 52-1 describes the database schema for notification alerts information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_NOTIFICATIONALERTS.

Table 52-1 Notification Alerts schema

Database Field Name Comment Data Type

IDX* Primary Key, Index of notification char(32), not null


alert.

NOTAG_IDX The notification that triggered this char(32), not null


alert. A pointer to table 'notification'.

ALERTDATETIME The time stamp when the alert was datetime, not null
generated.

SUBJECT The subject of the alert. nvarchar(255), varchar(255), not null

MSG The notification alert message text. nvarchar(512), varchar(512), not null
186 Notification Alerts data table
Notification Alerts schema

Table 52-1 Notification Alerts schema (continued)

Database Field Name Comment Data Type

HYPERLINK The link to the report with details nvarchar(512), varchar(512), not null
about the alert situation.

ACKNOWLEDGED The flag that indicates whether the int, not null
alert has been acknowledged.

ACKNOWLEDGED_USERID The GUID of the user who char(32), not null


acknowledged this notification.

ACKNOWLEDGED_TIME The time when the notification was datetime, not null
acknowledged.

USN A USN-based serial number; this ID bigint, not null


is not unique.

TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = Not deleted

1 = deleted
Chapter 53
Pattern data table
This chapter includes the following topics:

■ Pattern schema

Pattern schema
Table 53-1 describes the database schema for pattern information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_PATTERN.

Table 53-1 Pattern schema

Database Field Name Comment Data Type

PATTERN_IDX* Primary Key. char(32), not null

CLIENT_MONIKER The moniker for this content. varchar(40), not null


188 Pattern data table
Pattern schema

Table 53-1 Pattern schema (continued)

Database Field Name Comment Data Type

PATTERN_TYPE Virus definition = VIRUS_DEFS. nvarchar(128), varchar(128), not null

Possible values are as follows:

DECABI

DEUCE_SIG

ERASER_ENGINE

PTS_CONTENT

PTS_ENGINE

SYKNAPPS_CAL

SYKNAPPS_ENGINE

SYKNAPPS_WHITELIST

SEQUENCE The sequence number that is int, not null


associated with this definition.

PATTERNDATE The date when this content was datetime, not null
released.

REVISION The revision number for this content. int, not null

VERSION The version number for this content. varchar(255), not null

INSERTDATETIME The time when this pattern datetime, not null


information was entered into the
database.

USN A USN-based serial number; this ID bigint, not null


is not unique.

TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = Not deleted

1 = Deleted
Chapter 54
Reports data table (not
used)
This chapter includes the following topics:

■ Reports schema

Reports schema
The Reports data table is not used.
Table 54-1 describes the database schema for report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_REPORTS.

Table 54-1 Reports schema (not used)

Database Field Name Comment Data Type

ID* The GUID of the report object. char(32), not null

TYPE The type of report. varchar(256), not null

REPORT_TIME The report sample time. bigint, not null

SITE_ID The GUID of the site from which the char(32), not null
report was generated.
190 Reports data table (not used)
Reports schema

Table 54-1 Reports schema (not used) (continued)

Database Field Name Comment Data Type

DOMAIN_ID The GUID of the domain to which the char(32), null


report belongs.

The reports for system administrator


do not have DOMAIN_ID.

CHECKSUM The checksum of the XML content. char(32), not null

CONTENT The XML content of the schema image, not null


object.

USN The update serial number; used by bigint, not null


replication.

TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve merge
conflicts.

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

1 = Deleted

0 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 varchar(260), null

RESERVED_BINARY varbinary(2000), null


Chapter 55
Scan Report data table
This chapter includes the following topics:

■ Scan Report schema

Scan Report schema


Table 55-1 describes the database schema for scan report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SCANREPORT.

Table 55-1 Scan Report schema

Database Field Name Comment Data Type

SCANFILTER_IDX* Primary Key. char(32), not null

USER_ID The administrator GUID. char(32), not null

FILTERNAME The user-specified name for this saved filter. nvarchar(255), varchar(255),
not null

STARTTIMEFROM The start date. datetime, not null

STARTTIMETO The end date. datetime, not null


192 Scan Report data table
Scan Report schema

Table 55-1 Scan Report schema (continued)

Database Field Name Comment Data Type

RELATIVEDATETYPE Possible values are as follows: int, not null

0 = past week

1 = past month

2 = past three months

3 = past year

4 = past 24 hours

5 = current month

DURATION The length of the scan. int, not null

FILESCANNED The number of files scanned. bigint, not null

THREATS The number of risks the scan found. int, not null

FILESINFECTED The number of files the scan found. bigint, not null

SCANSTARTMESSAGE The scan description. nvarchar(255), varchar(255),


not null

STATUS The scan status as a hard-coded English key. varchar(32), not null

Possible values are as follows: Completed, Cancelled,


Started, % means no filter (all)

SERVERGROUPLIST A comma-separated list of server groups by which to nvarchar(255), varchar(255),


filter. These names can contain wildcard characters. not null

CLIENTGROUPLIST A comma-separated list of client groups by which to nvarchar(255), varchar(255),


filter. These names can contain wildcard characters. not null

PARENTSERVERLIST A comma-separated list of parent servers by which to nvarchar(255), varchar(255),


filter. These names can contain wildcard characters. not null

COMPUTERLIST A comma-separated list of computers by which to filter. nvarchar(512), varchar(512),


These names can contain wildcard characters. not null

IPADDRESSLIST A comma-separated list of IP addresses by which to nvarchar(255), varchar(255),


filter. These names can contain wildcard characters. not null

USERLIST A comma-separated list of users by which to filter. nvarchar(255), varchar(255),


These names can contain wildcard characters. not null

LASTCOLUMN Not used. varchar(32), not null


Scan Report data table 193
Scan Report schema

Table 55-1 Scan Report schema (continued)

Database Field Name Comment Data Type

SORTORDER Possible values are as follows: varchar(32), not null

'I.Computer'

'P.Parentserver'

'G.Clientgroup'

'C.Clientuser'

'S.Servergroup'

'SC.Startdatetime'

'SC.Duration'

'SC.Totalfiles' (total files scanned)

'SC.Threats'

'SC.Infected' (total files infected)

SORTDIR Sort direction. varchar(5), not null

Possible values are as follows:

desc = Descending

asc = Ascending

LIMITROWS The number of rows to use for pagination. int, not null

USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null

REPORT_IDX Not used. int, not null

REPORTINPUTS Special parameters if a report needs them. nvarchar(255), varchar(255),


not null

USN A USN-based serial number; this ID is not unique. bigint, not null

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = Not Deleted

1 = Deleted
194 Scan Report data table
Scan Report schema
Chapter 56
Scans data table
This chapter includes the following topics:

■ Scans schema

Scans schema
Table 56-1 describes the database schema for scans information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SCANS.

Table 56-1 Scans schema

Database Field Name Comment Data Type

SCAN_IDX* Primary Key. char(32), not null

SCAN_ID The scan ID provided by the agent. bigint, not null

STARTDATETIME The start time for the scan. datetime, not null

STOPDATETIME The stop time for the scan. datetime, not null

STATUS The scan status as a hard-coded English varchar(20), not null


key. Possible values are as follows:

completed = Completed

canceled = Canceled

started = Started
196 Scans data table
Scans schema

Table 56-1 Scans schema (continued)

Database Field Name Comment Data Type

DURATION The length of the scan in seconds. int, not null

COMPUTER_IDX Foreign key to char(32), not null


SEM_COMPUTER.COMPUTER_ID.

CLIENTUSER1 The user who was logged in when the scan nvarchar(64), varchar(64), not null
started.

CLIENTUSER2 The user who was logged in when the scan nvarchar(64), varchar(64), not null
ended.

SERVERGROUP_IDX Pointer to table IDENTITY_MAP (domain char(32), not null


GUID).

PARENTSERVER_IDX Pointer to table IDENTITY_MAP (server char(32), not null


GUID).

CLIENTGROUP_IDX Pointer to table IDENTITY_MAP (group char(32), not null


GUID).

MESSAGE1 The scan message when scan started. nvarchar(255), varchar(255)not null

MESSAGE2 The scan message when the scan ended. nvarchar(255), varchar(255), not null

THREATS The number of threats that the scan bigint, not null
found.

INFECTED The number of files that the scan found bigint, not null
infected.

TOTALFILES The number of files scanned. bigint, not null

OMITTED The number of files omitted. bigint, not null

USN A USN-based serial number; this ID is not bigint, not null


unique.

TIME_STAMP The time when this database record was bigint, not null
entered or modified in the database, in
milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = Not deleted

1 = Deleted
Scans data table 197
Scans schema

Table 56-1 Scans schema (continued)

Database Field Name Comment Data Type

SCAN_TYPE The type of scan. varchar(64), not null

Possible values are as follows:

ScanNow_Quick = Active Scan

ScanNow_Full = Full Scan

ScanNow_Custom = Admin-defined Scan

COMMAND_ID Pointer to table SEM_JOB; command ID varchar(32), null


that started this scan (if any).
198 Scans data table
Scans schema
Chapter 57
SE Global data table
This chapter includes the following topics:

■ SE Global schema

SE Global schema
Table 57-1 describes the database schema for the system sequence number.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
No primary key is specified for this table.

Table 57-1 SE Global schema

Database Field Name Comment Data Type

SEQ_NUM The latest USN on the site. bigint, not null


200 SE Global data table
SE Global schema
Chapter 58
SCF Inventory data table
(not used)
This chapter includes the following topics:

■ SCF Inventory schema

SCF Inventory schema


The SCF Inventory data table is not used.
Table 58-1 describes the database schema for SCF inventory information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SCFINVENTORY.

Table 58-1 SCF Inventory schema (not used)

Database Field Name Comment Data Type

AGENT_ID* Pointer to table SEM_AGENT. char(32), not null

IPSSIGDATE The date of the IPS signature. datetime, null

IPSSIGREV The revision of the IPS signature. int, null

SCFVERSION The firewall version. varchar(255), not null

SCFPOLICYFILE nvarchar(510), not null


202 SCF Inventory data table (not used)
SCF Inventory schema

Table 58-1 SCF Inventory schema (not used) (continued)

Database Field Name Comment Data Type

USN A USN-based serial number; this ID bigint, not null


is not unique.

TIME_STAMP The time when this database record bigint, not null
was entered or modified in the
database, in milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = Not deleted

1 = Deleted
Chapter 59
SEM Agent data table
This chapter includes the following topics:

■ SEM Agent schema

SEM Agent schema


Table 59-1 describes the database schema for agent information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_AGENT.

Table 59-1 SEM Agent schema

Database Field Name Comment Data Type

AGENT_ID* The GUID of the agent. char(32), not null

AGENT_TYPE The type of agent installed. varchar(64), null

Possible values are as follows:

105 = Symantec Endpoint Protection

151 = Symantec Network Access Control


204 SEM Agent data table
SEM Agent schema

Table 59-1 SEM Agent schema (continued)

Database Field Name Comment Data Type

R_OS_TYPE int, null


SEM Agent data table 205
SEM Agent schema

Table 59-1 SEM Agent schema (continued)

Database Field Name Comment Data Type

The Operating System type on the client computer.

Possible values are as follows:

50724882=Windows Server 2008

17170434 = Windows Vista Ultimate Edition

17170444 = Windows Vista Starter Edition

17170435 = Windows Vista Home Basic Edition

17170436 = Windows Vista Home Premium Edition

17170437 = Windows Vista Enterprise Edition

17170439 = Windows Vista Business Edition

50659858 = Windows Server 2003 Family Datacenter


Edition

50659874 = Windows Server 2003 Family Enterprise


Edition

50659890 = Windows Server 2003 Family Web Edition

50659842 = Windows Server 2003 Family Standard Edition

17105170 = Windows XP Home Edition

17105186 = Windows XP Home Embedded

17105154 = Windows XP Professional

50659346 = Windows 2000 Datacenter Server

50659362 = Windows 2000 Advanced Server

50659330 = Windows 2000 Server

17104898 = Windows 2000 Professional

50593810 = Windows NT Server 4.0, Enterprise Edition

50593794 = Windows NT Server 4.0

17039362 = Windows NT WorkStation 4.0

285185 = Windows Millennium

264961 = Windows 98 SE

264705 = Windows 98

262401 = Windows 95 OSR2

262145 = Windows 95
206 SEM Agent data table
SEM Agent schema

Table 59-1 SEM Agent schema (continued)

Database Field Name Comment Data Type

0 = OS Type Unspecified

COMPUTER_ID The GUID of the registered computer. char(32), null

DOMAIN_ID The GUID of the domain. char(32), null

GROUP_ID The current group GUID of the agent. char(32), null

AGENT_VERSION The version of the agent software. nvarchar(64), varchar(64),


null

PROFILE_VERSION The current profile version of the agent. varchar(64), null

PROFILE_SERIAL_NO The current profile serial number of the agent. varchar(64), null

PROFILE_CHECKSUM The current profile checksum of the agent. char(32), null

IDS_VERSION The current IDS version of the agent. varchar(64), null

IDS_SERIAL_NO The current IDS serial number of agent. varchar(64), null

IDS_CHECKSUM The current IDS checksum of the agent. char(32), null

HI_STATUS The Host integrity status. int, null

Possible values are as follows:

0 = Fail

1 = Success

2 = Pending

3 = Disabled

4 = Ignore

HI_REASONCODE The host integrity reason code. int, null

Possible values are as follows:

0 = Pass

101 = Antivirus version is out-of-date

102 = Antivirus is not running

103 = Script failed

104 = Check is incomplete

105 = Check is disabled

127 = Location changed


SEM Agent data table 207
SEM Agent schema

Table 59-1 SEM Agent schema (continued)

Database Field Name Comment Data Type

HI_REASONDESC The host integrity description. varchar(64), null

CREATION_TIME The create time of the agent. bigint, null

STATUS The online status of the agent. tinyint, null

Possible values are as follows:

0 = offline

1 = online

LAST_UPDATE_TIME The last online time of the agent. bigint, null

LAST_SERVER_ID The last connected server GUID. char(32), null

LAST_SITE_ID The last connected site GUID. char(32), null

ATTRIBUTE_EXTENSION Not used. nvarchar(2000),


varchar(2000), null

FULL_NAME The employee's full name. nvarchar(256),


varchar(256), null

EMAIL The employee's email address. nvarchar(129),


varchar(129), null

JOB_TITLE The employee's job title. nvarchar(128),


varchar(128), null

DEPARTMENT The employee's department. nvarchar(128),


varchar(128), null

EMPLOYEE_NUMBER The employee's number. varchar(32), null

EMPLOYMENT_STATUS The employee's status. varchar(16), null

OFFICE_PHONE The employee's office number. varchar(32), null

MOBILE_PHONE The employee's mobile number. varchar(32), null

HOME_PHONE The employee's home phone number. varchar(32), null

USN The update serial number; used by replication. bigint, not null

TIME_STAMP The time that the database record was modified; used to bigint, not null
resolve merge conflicts.
208 SEM Agent data table
SEM Agent schema

Table 59-1 SEM Agent schema (continued)

Database Field Name Comment Data Type

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

1 = Deleted

0 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260),
varchar(260), null

PATTERN_IDX Pointer to table 'pattern'. char(32), not null

AP_ONOFF Auto-Protect status. tinyint, not null

Possible values are as follows:

1 = On

2 = Not installed

0 = Off

127 = Not reporting

INFECTED Is this computer infected? tinyint, not null

Possible values are as follows:

0 = Not infected

1 = Infected
SEM Agent data table 209
SEM Agent schema

Table 59-1 SEM Agent schema (continued)

Database Field Name Comment Data Type

WORSTINFECTION_IDX Worst detection. int, not null

Possible values are as follows:

0 = (Severity 0) Viral

1 = (Severity 1) Non-Viral malicious

2 = (Severity 2) Malicious

3 = (Severity 3) Antivirus - Heuristic

5 = (Severity 5) Hack tool

6 = (Severity 6) Spyware

7 = (Severity 7) Trackware

8 = (Severity 8) Dialer

9 = (Severity 9) Remote access

10 = (Severity 10) Adware

11 = (Severity 11) Jokeware

12 = (Severity 12) Client compliancy

13 = (Severity 13) Generic load point

14 = (Severity 14) Proactive Threat Scan - Heuristic

15 = (Severity 15) Cookie

9999 = No detections

LAST_SCAN_TIME The last scan time for this agent (in GMT). bigint, not null

LAST_VIRUS_TIME The last time that a virus was detected on the client bigint, not null
computer (in GMT).

CONTENT_UPDATE Accepts content updates. tinyint, not null

Possible values are as follows:

1 = yes

0 = no
210 SEM Agent data table
SEM Agent schema

Table 59-1 SEM Agent schema (continued)

Database Field Name Comment Data Type

AVENGINE_ONOFF RTVScan status. tinyint, not null

Possible values are as follows:

1 = On

2 = Not installed

0 = Off

127 = Not reporting

TAMPER_ONOFF Tamper Protection status. tinyint, not null

Possible values are as follows:

1 = On

2 = Not installed

0 = Off

127 = Not reporting status

MAJOR_VERSION The Symantec Endpoint Protection version: 11. int, not null

MINOR_VERSION The minor version. int, not null

REBOOT_REQUIRED Restart Required. tinyint, not null

Possible values are as follows:

0 = No

1 = Yes

REBOOT_REASON Format is <component> = <reason ID>;<component> = varchar(128), not null


<reason ID>...

Components are as follows:

AVMAN = Antivirus

LUMAN = LiveUpdate

FW = Network Threat Protection

GUP = Group Update Provider

Reasons are as follows:

1 = Risk remediation to complete

2 = Product patch to apply

3 = Content download to apply


SEM Agent data table 211
SEM Agent schema

Table 59-1 SEM Agent schema (continued)

Database Field Name Comment Data Type

LICENSE_STATUS For future use. int, not null

LICENSE_EXPIRY For future use. bigint, not null

TIMEZONE The time zone offset of the client computer. int, not null

FIREWALL_ONOFF The firewall status. tinyint, not null

Possible values are as follows:

1 = On

2 = Not installed

0 = Off

127 = Not reporting

FREE_MEM The free memory available. bigint, null

FREE_DISK The free disk space available. bigint, null

LAST_DOWNLOAD_TIME The last download time. bigint, not null


212 SEM Agent data table
SEM Agent schema
Chapter 60
SEM Application data table
This chapter includes the following topics:

■ SEM Application schema

SEM Application schema


Table 60-1 describes the database schema for application information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_APPLICATION.

Table 60-1 SEM Application schema

Database Field Name Comment Data Type

DOMAIN_ID* The GUID of the domain. char(32), not null

APP_HASH* The checksum of the learned char(32), not null


application, including the name, path,
file checksum, file size, and so on.

APPLICATION_NAME The name of the learned application. nvarchar(260), varchar(260), not null

APPLICATION_PATH The path of the learned application. nvarchar(260), varchar(260), null

APP_DESCRIPTION The description of the learned nvarchar(1024), varchar(1024), null


application.

CHECKSUM The file checksum of the application char(32), not null


binary.
214 SEM Application data table
SEM Application schema

Table 60-1 SEM Application schema (continued)

Database Field Name Comment Data Type

FILE_SIZE The file size of the application binary. bigint, null

VERSION The file version of the application varchar(256), null


binary.

LAST_MODIFY_TIME The last modification time of the bigint, null


application binary.

USN The update serial number; used by bigint, not null


replication.

TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

1 = Deleted

0 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260), varchar(260), null

RESERVED_BINARY varbinary(2000), null


Chapter 61
SEM Client data table
This chapter includes the following topics:

■ SEM Client schema

SEM Client schema


Table 61-1 describes the database schema for the client information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_CLIENT.

Table 61-1 SEM Client schema

Database Field Name Comment Data Type

CLIENT_ID* The GUID of the client. Primary Key. char(32), not null

DOMAIN_ID The GUID of the domain. char(32), null

GROUP_ID The GUID of the group. char(32), null

GROUP_IS_OU If the client is from Active Directory. tinyint, null

OU_GUID The GUID of the Organizational Unit char(32), null


if the client is from the Active
Directory.

POLICY_MODE Enum {USER_MODE, int, null


COMPUTER_MODE}
216 SEM Client data table
SEM Client schema

Table 61-1 SEM Client schema (continued)

Database Field Name Comment Data Type

COMPUTER_ID The GUID of the registered computer. char(32), null

HARDWARE_KEY The hash of the computer hardware char(32), null


information.

COMPUTER_NAME The computer name. nvarchar(64), varchar(64), null

COMPUTER_DOMAIN_NAME The computer description. nvarchar(256), varchar(256), null

DESCRIPTION The domain name of the computer. nvarchar(256), varchar(256), null

USER_NAME The user logon name. nvarchar(64), varchar(64), null

FULL_NAME The full name of the user. nvarchar(64), varchar(64), null

USER_DOMAIN_NAME The user logon domain name. nvarchar(256), varchar(256), null

HASH The hash of the following: char(32), not null

POLICY_MODE

COMPUTER_NAME

COMPUTER_DOMAIN_NAME

USER_NAME

USER_DOMAIN_NAME

PIN_MARK A flag to mark whether this client tinyint, null


should be synchronized with Active
Directory.

EXTRA_FEATURE int, null

CREATOR tinyint, null

CREATION_TIME The create time of the client. bigint, null

USN The update serial number; used by bigint, not null


replication.

TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.
SEM Client data table 217
SEM Client schema

Table 61-1 SEM Client schema (continued)

Database Field Name Comment Data Type

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

1 = Deleted

0 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260), varchar(260), null

RESERVED_BINARY varbinary(2000), null


218 SEM Client data table
SEM Client schema
Chapter 62
SEM Compliance Criteria
data table
This chapter includes the following topics:

■ SEM Compliance Criteria schema

SEM Compliance Criteria schema


Table 62-1 describes the database schema for compliance criteria information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_COMPLIANCE_CRITERIA.

Table 62-1 SEM Compliance Criteria schema

Database Field Name Comment Data Type

CRITERIA_IDX* Primary Key. char(32), not null

AGENT_SECURITY_LOG_IDX* Foreign key to char(32), not null


V_AGENT_SECURITY.AGENT_SECURITY_LOG_IDX.

ACTION ACTION is a hard-coded English key with one of two possible varchar(64), not null
values: "check" or "remediation".

RULE_NAME The administrator-provided rule name from the policy. nvarchar(256),


varchar(256), not
null
220 SEM Compliance Criteria data table
SEM Compliance Criteria schema

Table 62-1 SEM Compliance Criteria schema (continued)

Database Field Name Comment Data Type

RULE_TYPE RULE_TYPE is a hard-coded English key with one of the varchar(64), not null
following possible values:

antivirus

antispyware

patch

service pack

firewall

custom

unknown - fallback when processing log at the server and


action ends up null or blank
SEM Compliance Criteria data table 221
SEM Compliance Criteria schema

Table 62-1 SEM Compliance Criteria schema (continued)

Database Field Name Comment Data Type

CRITERIA varchar(256), not


null
222 SEM Compliance Criteria data table
SEM Compliance Criteria schema

Table 62-1 SEM Compliance Criteria schema (continued)

Database Field Name Comment Data Type

CRITERIA is a hard-coded English key with one of the


following possible values:

as_is_installed

as_is_running

as_signature_ok

av_is_installed

av_is_running

av_signature_ok

file_age_ok

file_date_ok

file_size_ok

file_version_ok

file_download

file_exists

file_checksum_ok

file_execute

fw_is_installed

fw_is_running

patch_is_installed

reg_value_incr

reg_key_exists

reg_value_ok

reg_value_exists

reg_value_set

timestamp_ok

msg_dlg_ok

os_ok

os_lang_ok

process_is_running – means either user application or


service
SEM Compliance Criteria data table 223
SEM Compliance Criteria schema

Table 62-1 SEM Compliance Criteria schema (continued)

Database Field Name Comment Data Type

file_delete

service_pack_ok

hi_setup

remediation – to provide an overall status of remediation

unknown – fallback at the server if the criteria type is null


or blank

TARGET The target of the criteria. For example, it can be the antivirus nvarchar(256),
product name, the firewall product name, the file name, the varchar(256), not
registry key, the registry value. It can also be the patch null
version, the OS version, the process name, or the service
name.

RESULT RESULT takes one of the following possible values: varchar(64), not null

pass

fail

ignore

error

postponed – just for remediation criteria

unknown – fallback at the server if the criteria or rule ends


up without a final status
224 SEM Compliance Criteria data table
SEM Compliance Criteria schema

Table 62-1 SEM Compliance Criteria schema (continued)

Database Field Name Comment Data Type

ERROR ERROR takes one of the following possible values: varchar(128), not
null
unknown = unknown

product_unknown = product unknown

file_notfound = file not found

filename_invalid = invalid file name

parameter_invalid = invalid condition parameter

parameter_undefined = condition parameter was not


specified in the policy

bad_url = URL format is invalid

filedownload_op_err = URL not accessible or failed to create


destination file

time_out = action timed out

connection_lost = connection was lost

access_violation = access violation on file

access_denied = access denied

remediation_abort = user aborted remediation

remediation_postpone = user postponed remediation

createdir_failed = directory creation failed

system_err = system error

runas_noprivilege = a required privilege is not held by the


client

internal_err = internal error

os_unknown = failed to detect operating system type


SEM Compliance Criteria data table 225
SEM Compliance Criteria schema

Table 62-1 SEM Compliance Criteria schema (continued)

Database Field Name Comment Data Type

DESCRIPTION Additional compliance check details. Either exception text nvarchar(256),


or one of the following values: varchar(256), not
null
Checksum_blank = fingerprint value is empty

Failed_to_get_modification_date = failed to get modification


date

NAN = not a number

Cannot_parse_URL = cannot parse URL

URL_not_accessible_or_failed_to_create_destination_file
= URL not accessible or failed to create destination file

Download_exceeded_limit = download exceeded limit

Destination = destination file access violation

By_User = action initiated by user

Access_denied_by_server = access denied by server

Download_file = download file not found

Process_time_out = process timed out

Failed_to_detect_OS_type = failed to detect OS type

Application_name_is_empty = application name is empty

Probably_software_is_not_installed = probably the software


is not installed

Signature_age_in_seconds_failed = cannot compute


signature age

Failed_to_parse_URL = failed to parse URL

Missing_or_no_version_info = missing or no version


information

After_script_file_running = after script file run

OS_ignore = operating system check was ignored

Save_failed = save failed

No_previous_time = no previous time

OK_or_YES = user response was OK or Yes

Cancel_or_NO = user response was Cancel or No

Fail_to_get_current_OS_language_version = cannot retrieve


current operating system language
226 SEM Compliance Criteria data table
SEM Compliance Criteria schema

Table 62-1 SEM Compliance Criteria schema (continued)

Database Field Name Comment Data Type

USN The update serial number; used by replication. bigint, not null

TIME_STAMP The time that the database record was modified; used to bigint, not null
resolve merge conflicts.

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

1 = Deleted

0 = Not Deleted
Chapter 63
SEM Computer data table
This chapter includes the following topics:

■ SEM Computer schema

SEM Computer schema


Table 63-1 describes the database schema for computer information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_COMPUTER

Table 63-1 SEM Computer schema

Database Field Name Comment Data Type

COMPUTER_ID* The GUID of the computer. char(32), not null

The computer can be added from both


the console and the agent.

Primary Key.

DOMAIN_ID The GUID of the domain. char(32), null

HARDWARE_KEY The hash of the computer hardware char(32), null


information.

COMPUTER_NAME The computer name. nvarchar(64), varchar(64), null

COMPUTER_DOMAIN_NAME The computer description. nvarchar(256), varchar(256), null


228 SEM Computer data table
SEM Computer schema

Table 63-1 SEM Computer schema (continued)

Database Field Name Comment Data Type

COMPUTER_DESCRIPTION The domain name of the computer. nvarchar(256), varchar(256), null

PROCESSOR_TYPE The processor type. nvarchar(64), varchar(64), null

PROCESSOR_CLOCK The processor clock. bigint, null

PROCESSOR_NUM The number of processors. int, null

MEMORY The physical memory in KB. bigint, null

BIOS_VERSION The BIOS version. varchar(128), null

TPM_DEVICE The TPM device ID. int, null

OPERATION_SYSTEM The operation system name. nvarchar(64), varchar(64), null

SERVICE_PACK The service pack. nvarchar(64), varchar(64), null

CURRENT_LOGIN_USER The user who is logged in. nvarchar(64), varchar(64), null

CURRENT_LOGIN_DOMAIN The Windows domain. nvarchar(256), varchar(256), null

DNS_SERVER1 bigint, null

DNS_SERVER2 bigint, null

WINS_SERVER1 bigint, null

WINS_SERVER2 bigint, null

DHCP_SERVER bigint, null

MAC_ADDR1 varchar(17), null

IP_ADDR1 bigint, null

GATEWAY1 bigint, null

SUBNET_MASK1 bigint, null

MAC_ADDR2 varchar(17), null

IP_ADDR2 bigint, null

GATEWAY2 bigint, null

SUBNET_MASK2 bigint, null

MAC_ADDR3 varchar(17), null


SEM Computer data table 229
SEM Computer schema

Table 63-1 SEM Computer schema (continued)

Database Field Name Comment Data Type

IP_ADDR3 bigint, null

GATEWAY3 bigint, null

SUBNET_MASK3 bigint, null

MAC_ADDR4 varchar(17), null

IP_ADDR4 bigint, null

GATEWAY4 bigint, null

SUBNET_MASK4 bigint, null

USN The update serial number; used by bigint, not null


replication.

TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

1 = Deleted

0 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260), varchar(260), null

RESERVED_BINARY varbinary(2000), null

DISK_TOTAL The total disk space. bigint, null

DISK_DRIVE The drive letter that is referred to by varchar(3), null


DISK_TOTAL.
230 SEM Computer data table
SEM Computer schema

Table 63-1 SEM Computer schema (continued)

Database Field Name Comment Data Type

OS_LANG The operating system language ID, int, null


for example, English = 0x09.
Chapter 64
SEM Content data table
This chapter includes the following topics:

■ SEM Content schema

SEM Content schema


Table 64-1 describes the database schema for content information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_CONTENT.

Table 64-1 SEM Content schema

Database Field Name Comment Data Type

AGENT_ID* The GUID of the agent. char(32), not null

PATTERN_IDX* Pointer to pattern table. char(32), not null

USN The update serial number; used by bigint, not null


replication.

TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.
232 SEM Content data table
SEM Content schema

Table 64-1 SEM Content schema (continued)

Database Field Name Comment Data Type

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

1 = Deleted

0 = Not Deleted
Chapter 65
SEM Job data table
This chapter includes the following topics:

■ SEM Job schema

SEM Job schema


Table 65-1 describes the database schema for job information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SEM_JOB.

Table 65-1 SEM Job schema

Database Field Name Comment Data Type

COMMAND_ID* The GUID of the command object. This GUID char(32), not null
corresponds to the ID in the Basic Metadata table.

USN The update serial number; used by replication. bigint, not null
234 SEM Job data table
SEM Job schema

Table 65-1 SEM Job schema (continued)

Database Field Name Comment Data Type

COMMAND_NAME A hard-coded English string that indicates which varchar(64), not null
command was launched. This string is the same string
that is placed in the XML for pre-defined name.

Possible values are as follows:

Update_Now = Update Content

ScanNow_Full = Full Scan

ScanNow_Quick = Active Scan

ScanNow_Custom = Custom Scan

Update_ScanNow_Full = Update Content and Scan Full

Update_ScanNow_Quick = Update Content and Scan


Quick

Update_ScanNow_Custom = Update Content and Scan


Custom

CancelScan = Cancel Scan

Reboot = Restart

ApOn = Turn Auto-Protect On

ApOff = Turn Auto-Protect Off

FwOn = Turn Firewall On

FwOff = Turn Firewall Off

DeleteQuarantine = Delete from Quarantine

COMMAND_DESC A detailed description of the command. nvarchar(350),


varchar(350), null

SOURCE_SITE_ID The GUID of the site from which the command was char(32), not null
generated.

SOURCE_ADMIN_ID The GUID of the administrator who issued the char(32), not null
command.

CREATE_TIME The time that the command was issued at the console bigint, not null
by the administrator.

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
SEM Job data table 235
SEM Job schema

Table 65-1 SEM Job schema (continued)

Database Field Name Comment Data Type

DELETED Deleted row: tinyint, not null

1 = Deleted

0 = Not Deleted

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 varchar(260), null

RESERVED_BINARY varbinary(1000), null


236 SEM Job data table
SEM Job schema
Chapter 66
Serial Numbers data table
This chapter includes the following topics:

■ Serial Numbers schema

Serial Numbers schema


Table 66-1 describes the database schema for serial number information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
No primary key is specified for this table.

Table 66-1 Serial Numbers schema

Database Field Name Comment Data Type

GROUP_ID The GUID of a group. char(32), not null

PROFILE_SERIAL_NO The profile serial number of the varchar(64), not null


group.
238 Serial Numbers data table
Serial Numbers schema
Chapter 67
Server Admin Logs data
tables
This chapter includes the following topics:

■ Server Admin Logs 1 and 2 schema

Server Admin Logs 1 and 2 schema


Table 67-1 describes the database schema for the Server Administration logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
No primary key is specified for this table.

Table 67-1 Server Admin Logs 1 and 2 schema

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null

DOMAIN_ID The GUID of the domain to which the log belongs. char(32), null

SITE_ID The GUID of the site to which the log belongs. char(32), not null
240 Server Admin Logs data tables
Server Admin Logs 1 and 2 schema

Table 67-1 Server Admin Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

SERVER_ID The GUID of the server to which the log belongs. char(32), not null

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.

SEVERITY Enum (SEVERE, WARNING, INFO, CONFIG, FINE, int, not null
FINER, FINEST).

ADMIN_NAME The Administrator’s name. nvarchar(250), varchar(250),


not null
Server Admin Logs data tables 241
Server Admin Logs 1 and 2 schema

Table 67-1 Server Admin Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

EVENT_ID int, not null


242 Server Admin Logs data tables
Server Admin Logs 1 and 2 schema

Table 67-1 Server Admin Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

The unique ID of the admin event.

Possible values are as follows:

0x1001 = Login succeeded

0x1002 = Login failed

0x1003 = Log out

0x1004 = Account locked

0x1005 = Account unlocked

0x1006 = Account disabled

0x1007 = Account enabled

0x1008 = Administrator created

0x1009 = Administrator deleted

0x100A = Administrator renamed

0x100B = Password changed

0x100C = Administrator properties are changed

0x100D = Domain is created

0x100E = Domain is deleted

0x100F = Domain properties are changed

0x1020 = Domain is disabled

0x1021 = Domain is enabled

0x1022 = Domain is renamed

0x2001 = Group is created

0x2002 = Group is deleted

0x2003 = Group is renamed

0x2004 = Group is moved

0x2005 = Group properties are changed

0x2006 = User is created

0x2007 = User is deleted

0x2008 = User is moved

0x2009 = User is copied

0x200A = User policy mode is switched


Server Admin Logs data tables 243
Server Admin Logs 1 and 2 schema

Table 67-1 Server Admin Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

0x200B = User properties are changed

0x200C = Computer is created

0x200D = Computer is deleted

0x200E = Computer is moved

0x200F = Computer is copied

0x2010 = Computer policy mode is switched

0x2011 = Computer properties are changed

0x2012 = Organizational Unit is imported

0x2013 = Domain user is imported

0x2014 = LDAP user is imported

0x3001 = Package is created

0x3002 = Package is deleted

0x3003 = Package is exported

0x3004 = Package is moved to recycle bin

0x3005 = Package is now current

0x3006 = Package is added to other domain

0x3007 = Package properties are changed

0x3008 = Package deployment created

0x3009 = Package deployment deleted

0x300A = Package deployment properties changed

0x300B = Package updated

0x4001 = Replication partner is registered

0x4002 = Replication partner is deleted

0x4003 = Remote site is deleted

0x4004 = Site properties are changed

0x4005 = Server properties are changed

0x4006 = Database properties are changed

0x4007 = Partner properties are change

0x4008 = Site license is changed

0x4009 = Enforcer license changed


244 Server Admin Logs data tables
Server Admin Logs 1 and 2 schema

Table 67-1 Server Admin Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

0x4010 = Replicate now

0x4011 = Back up now

0x4012 = External logging properties are changed

0x4013 = Site backup settings changed

0x4014 = Server deleted

0x4015 = Server certificate changed

0x4016 = Enforcer group properties changed

EVENT_DESC A description of the event. Usually, the first line of the nvarchar(256), varchar(256),
description is treated as “summary". null

MSG_ID The event description ID. Use this ID to load the int, null
localized message. Only used when an exception is
related to this event.

ERROR_CODE ErrorCode can uniquely identify the error in source int, null
code. Used only when an exception is related to this
event.

STACK_TRACE The stack trace of the exception. Used only when an nvarchar(2000),
exception is related to this event. varchar(2000), null

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(520), null

RESERVED_BINARY varbinary(2000), null


Chapter 68
Server Client Logs data
tables
This chapter includes the following topics:

■ Server Client Logs 1 and 2 schema

Server Client Logs 1 and 2 schema


Table 68-1 describes the database schema for the Server Client logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_SERVER_CLIENT_LOG_1_LOG_IDX or
I_SERVER_CLIENT_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.

Table 68-1 Server Client Logs 1 and 2 schema

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null
246 Server Client Logs data tables
Server Client Logs 1 and 2 schema

Table 68-1 Server Client Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

DOMAIN_ID The GUID of the domain to which the log belongs. char(32), null

SITE_ID The GUID of the site to which the log belongs. char(32), not null

SERVER_ID The GUID of the server to which the log belongs. char(32), not null

TIME_STAMP The time when this database record was entered bigint, not null
or modified in the database, in milliseconds since
1970.

EVENT_ID The unique ID of the client activity event. int, not null

Possible values are as follows:

1 = Registration succeeded

2 = Registration failed

3 = Client reconnected

4 = Client disconnected

5 = Downloaded policy

6 = Downloaded Intrusion Prevention policy

7 = Downloaded sylink.xml

8 = Downloaded auto-upgrade file

9 = Server received log

10 = Log processing failed

11 = Server received learned application

12 = Server received client information

13 = Client information processing failed

14 = Hardware identity change

15 = Downloaded File Fingerprint list

20 = Downloaded content package

22 = Downloaded command

AGENT_ID The GUID of the agent. char(32), not null

HOST_NAME The computer name of the client. nvarchar(256), varchar(256),


null

USER_NAME The logon user name of the client. nvarchar(256), varchar(256),


null
Server Client Logs data tables 247
Server Client Logs 1 and 2 schema

Table 68-1 Server Client Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

DOMAIN_NAME The domain name of the client. nvarchar(256), varchar(256),


null

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260), varchar(260),


null

RESERVED_BINARY varbinary(2000), null

LOG_IDX* The log index unique ID. char(32), null


248 Server Client Logs data tables
Server Client Logs 1 and 2 schema
Chapter 69
Server Enforcer Logs data
tables
This chapter includes the following topics:

■ Server Enforcer Logs 1 and 2 schema

Server Enforcer Logs 1 and 2 schema


Table 69-1 describes the database schema for the Server Enforcer logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
The key is either I_SERVER_ENFORCER_LOG_1_LOG_IDX or
I_SERVER_ENFORCER_LOG_2_LOG_IDX. The LOG_IDX field serves as the table's
unique identifier, but it is not formally classified as the table's primary key. This
field has an index on it, but it is not the primary key index. This table has no
primary key.

Table 69-1 Server Enforcer Logs 1 and 2 schema

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null
250 Server Enforcer Logs data tables
Server Enforcer Logs 1 and 2 schema

Table 69-1 Server Enforcer Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

SITE_ID The GUID of the site to which the log belongs. char(32), not null

SERVER_ID The GUID of the server to which the log belongs. char(32), not null

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.
Server Enforcer Logs data tables 251
Server Enforcer Logs 1 and 2 schema

Table 69-1 Server Enforcer Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

EVENT_ID int, not null


252 Server Enforcer Logs data tables
Server Enforcer Logs 1 and 2 schema

Table 69-1 Server Enforcer Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

The unique ID of the Enforcer activity.

Possible values are as follows:

0x101 = Connected to Symantec Endpoint Protection


Manager

0x102 = Lost connection to Symantec Endpoint


Protection Manager

0x103 = Applied policy that is downloaded from


Symantec Endpoint Protection Manager

0x104 = Failed to apply policy that is downloaded from


Symantec Endpoint Protection Manager

0x107 = Applied management server configuration

0x108 = Failed to apply management server


configuration

0x201 = Enforcer started

0x202 = Enforcer stopped

0x203 = Enforcer paused

0x204 = Enforcer resumed

0x205 = Enforcer disconnected from server

0x301 = Enforcer failover enabled

0x302 = Enforcer failover disabled

0x303 = Enforcer in standby mode

0x304 = Enforcer in primary mode

0x305 = Enforcer short

0x306 = Enforcer loop

0x401 = Forward engine pause

0x402 = Forward engine start

0x403 = DNS Enforcer enabled

0x404 = DNS Enforcer disabled

0x405 = DHCP Enforcer enabled

0x406 = DHCP Enforcer disabled

0x407 = Allow all enabled


Server Enforcer Logs data tables 253
Server Enforcer Logs 1 and 2 schema

Table 69-1 Server Enforcer Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

0x408 = Allow all disabled

0x501 = Seat number change

0x601 = Failed to create policy parser

0x602 = Failed to import policy that is downloaded


from Symantec Endpoint Protection Manager

0x603 = Failed to export policy that is downloaded


from Symantec Endpoint Protection Manager

0x701 = Incorrect customized attribute

ENFORCER_ID The GUID of the Enforcer. char(32), not null

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(520), null

RESERVED_BINARY varbinary(2000), null

LOG_IDX* char(32), null


254 Server Enforcer Logs data tables
Server Enforcer Logs 1 and 2 schema
Chapter 70
Server Policy Logs data
tables
This chapter includes the following topics:

■ Server Policy Logs 1 and 2 schema

Server Policy Logs 1 and 2 schema


Table 70-1 describes the database schema for the Server Policy logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
No primary key is specified for this table.

Table 70-1 Server Policy Logs 1 and 2 schema

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null

DOMAIN_ID The GUID of the domain which was administered. char(32), null

SITE_ID The GUID of the site to which the log belongs. char(32), not null
256 Server Policy Logs data tables
Server Policy Logs 1 and 2 schema

Table 70-1 Server Policy Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

SERVER_ID The GUID of the server to which the log belongs. char(32), not null

TIME_STAMP The time when this database record was entered bigint, not null
or modified in the database, in milliseconds since
1970.

EVENT_ID The unique ID of the policy event. int, not null

Possible values are as follows:

0 = Policy added

1 = Policy deleted

2 = Policy edited

3 = Add shared policy upon system install

4 = Add shared policy upon system upgrade

5 = Add shared policy upon domain creation

OBJECT_ID The GUID of the Agent Policy. char(32), not null

ADMIN_ID The GUID of the administrator who modified the char(32), not null
policy.

EVENT_DESC A description of the event. Usually, the first line nvarchar(512), null
of the description is treated as “summary".

EVENT_DATA Additional data in binary format. This field is varbinary(2000), null


optional.

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260), varchar(260),


null

RESERVED_BINARY varbinary(2000), null


Chapter 71
Server System Logs data
tables
This chapter includes the following topics:

■ Server System Logs 1 and 2 schema

Server System Logs 1 and 2 schema


Table 71-1 describes the database schema for the Server System logs.
There are two tables for this schema. When logs are stored, the Symantec Endpoint
Protection Manager uses the first table until it is full. The management server
then uses the second table. The data in the first table is kept intact until the second
table fills. Then the management server starts to fill the first table again. This
cycle is continuous.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
No primary key is specified for this table.

Table 71-1 Server System Logs 1 and 2 schema

Database Field Name Comment Data Type

USN A USN-based serial number; this ID is not unique. bigint, not null

DOMAIN_ID Not used, logged as a 0-length string. char(32), null

SITE_ID The GUID of the site to which the log belongs. char(32), not null
258 Server System Logs data tables
Server System Logs 1 and 2 schema

Table 71-1 Server System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

SERVER_ID The GUID of the server to which the log belongs. char(32), not null

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.

SEVERITY Enum (SEVERE, WARNING, INFO, CONFIG, FINE, int, not null
FINER, FINEST):

>= 400 = Finer and above

>=500 = Fine and above

>=700 = Configuration and above

>=800 = Informational and above

>=900 = Warning and above

>=1000 = Severe and above

EVENT_ID The unique ID of the system event. int, not null

EVENT_DESC A description of the event; usually, the first line of nvarchar(2000),


description is treated as a “summary.” varchar(2000), null

MSG_ID The event description ID. Use this ID to load a localized int, null
message. Only used when an exception is related to
this event.

ERROR_CODE ErrorCode can unique identify the error in source code. int, null
Only used when an exception is related to this event.

STACK_TRACE Stack trace of exception. Only used when an exception nvarchar(2000),


is related to this event. varchar(2000), null

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260),
varchar(260), null
Server System Logs data tables 259
Server System Logs 1 and 2 schema

Table 71-1 Server System Logs 1 and 2 schema (continued)

Database Field Name Comment Data Type

RESERVED_BINARY varbinary(2000), null


260 Server System Logs data tables
Server System Logs 1 and 2 schema
Chapter 72
System Report data table
This chapter includes the following topics:

■ System Report schema

System Report schema


Table 72-1 describes the database schema for system report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SYSTEMREPORT.

Table 72-1 System Report schema

Database Field Name Comment Data Type

SYSTEMFILTER_IDX* Primary Key. char(32), not null

USER_ID The ID of the administrator who created this filter. Foreign char(32), not null
key to user_id column in the Admin User table.

FILTERNAME The filter name that the administrator provided during the nvarchar(255),
save filter operation. varchar(255), not null

STARTDATEFROM The time filter start date. datetime, not null

STARTDATETO The time filter end date. datetime, not null


262 System Report data table
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

RELATIVEDATETYPE Possible values are as follows: int, not null

0 = past week

1 = past month

2 = past three months

3 = past year

4 = past 24 hours

5 = current month

SYSTEM_TYPE Possible values are as follows: tinyint, null

1 = Administrative

2 = Client server activity

3 = Server activity

4 = Client activity

5 = Enforcer Activity

SEVERITY For Administrative, Client-Server, and Server Activity logs, int, null
possible values are as follows:

1000 = Error and above

900 = Warning and above

800 = Informational and above

-1 = No filter (all)

For Enforcer activity and Client activity, possible values are


as follows:

0 = Informational and above

1 = Warning and above

2 = Error and above

3 = Fatal

-1 = No filter (all)
System Report data table 263
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

EVENT_ID varchar(32), not null


264 System Report data table
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

Blank or % in this field means no filtering.

For the Administrative System log. For this log type, this
field stores the value on the left of the = sign, for example,
'ADMIN_ADMIN_TYPES'. It is a hard-coded English string
key. To the right of the = sign are the events that are queried
when the user selects the group.

ADMIN_ADMIN_TYPES = Administrator events.

Possible values are as follows:

4097 = Login succeeded

4098 = Login failed

4099 = Logout

4050 = Account locked

4101 = Account unlocked

4102 = Account disabled

4103 = Account enabled

4104 = Administrator created

4105 = Administrator deleted

4106 = Administrator renamed

4107 = Password changed

4108 = Administrator properties are changed

ADMIN_DOMAIN_TYPES = Domain events.

Possible values are as follows:

4109 = Domain is created

4110 = Domain is deleted

4111 = Domain properties are changed

4128 = Domain is disabled

4129 = Domain is enabled

4130 = Domain is renamed

ADMIN_GROUP_TYPES = Group events.

Possible values are as follows:

8193 = Group is created


System Report data table 265
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

8194 = Group is deleted

8195 = Group is renamed

8196 = Group is moved

8197 = Group properties are changed

ADMIN_USER_TYPES = User events.

Possible values are as follows:

8198 = User is created

8199 = User is deleted

8200 = User is moved

8201 = User is copied

8202 = User policy mode is switched

8203 = User properties are changed

ADMIN_COMPUTER_TYPES = Computer events.

Possible values are as follows:

8204 = Computer is created

8205 = Computer is deleted

8206 = Computer is moved

8207 = Computer is copied

8208 = Computer policy mode is switched

8209 = Computer properties are changed

ADMIN_IMPORT_TYPES = Import events.

Possible values are as follows:

8210 = Organizational Unit is imported

8211 = Domain user is imported

8212 = LDAP user is imported

ADMIN_PACKAGE_TYPES = Package events.

Possible values are as follows:

12289 = Package is created

12290 = Package is deleted

12291 = Package is exported


266 System Report data table
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

12292 = Package is moved to recycle bin

12293 = Package is now current

12294 = Package is added to other domain

12295 = Package properties are changed

12296 = Package deployment created

12297 = Package deployment deleted

12298 = Package deployment properties changed

12299 = Package updated

ADMIN_REPLICATION_TYPES = Replication events.

Possible values are as follows:

16385 = Replication partner is registered

16386 = Replication partner is deleted

16400 = Replicate now

ADMIN_OTHER_TYPES = Other events.

Possible values are as follows:

16387 = Remote site is deleted

16388 = Site properties are changed

16389 = Server properties are changed

16390 = Database properties are changed

16391 = Partner properties are changed

16392 = Site license is changed

16393 = Enforcer license changed

16394 = Replicate now

16395 = Back up now

16396 = External logging properties are changed

16397 = Site backup settings changed

16398 = Server deleted

16399 = Server certificate changed

16401 = Back up now

16402 = External logging properties are changed


System Report data table 267
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

16403 = Site backup settings changed

16404 = Server deleted

16405 = Server certificate changed

16406 = Enforcer group properties changed

For the Client-Server Activity System log. For this log type,
this field stores the event ID to query.

1 = Registration succeeded

2 = Registration failed

3 = Client reconnected

4 = Client disconnected

5 = Downloaded policy

6 = Downloaded Intrusion Prevention policy

7 = Downloaded sylink.xml

8 = Downloaded auto-upgrade file

9 = Server received log

10 = Log processing failed

11 = Server received learned application

12 = Server received client information

13 = Client information processing failed

14 = Hardware identity change

15 = Downloaded File Fingerprint list

20 = Downloaded content package

22 = Downloaded command

For Server Activity System log. For this log type, this field
stores the hard-coded English string key that is located to
the left of the = sign. To the right are listed the events that
are queried for by the group.

SERVER_EVENT_TYPES = Server events.

Possible values are as follows:

257 = Server startup successfully

258 = Server startup failed


268 System Report data table
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

259 = Server shut down gracefully

260 = Server created

SERVER_AGENT_EVENT_TYPES = Database maintenance


events.

Possible values are as follows:

267 = Client sweeping started

268 = Client sweeping summary

269 = Client sweeping succeeded

270 = Client sweeping failed

271 = Database logs have been swept

SERVER_BACKUP_EVENT_TYPES = Backup events.

Possible values are as follows:

1025 = Backup connection failed

1026 = Backup data fetch failed

1027 = Backup file write failed

1028 = Backup unknown failed

1029 = Backup success

1030 = Backup started

SERVER_RADIUS_EVENT_TYPES = Radius Server events.

Possible values are as follows:

1283 = Failed to start Radius Server. The radius port may


be used by another process.

1284 = Failed to start Radius Server. Set non-Block IO socket


failed.

1285 = Failed to start Radius Server. Create socket error.

SERVER_REPLICATION_EVENT_TYPES = Replication
events.

Possible values are as follows:

769 = Replication from remote site started

770 = Replication failed to login to remote site

771 = Unable to fetch changed data from remote site


System Report data table 269
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

772 = Replication finished successfully

773 = Replication failed

774 = Replication merge failed

775 = Unable to connect to remote site

776 = Name changed to resolve merge conflict

777 = Group full path name is too long for replication

778 = Retrieval of local changed data for remote site started

779 = Retrieval of local changed data for remote site finished


successfully

780 = Retrieval of local changed data for remote site failed

781 = The database had chosen to terminate replication to


end the deadlock

782 = Replication data is received

SERVER_IMPORT_EVENT_TYPES = Import events.

Possible values are as follows:

264 = Organization importing started

265 = Organization importing succeeded

266 = Organization importing failed

SERVER_INTRUSION_PREVENTION_EVEN = Policy content


updates.

Possible values are as follows:

1537 = Added Intrusion Prevention Library

1538 = Deleted Intrusion Prevention Library

1539 = Updated Intrusion Prevention Library

1540 = Intrusion Prevention Library is up to date

SERVER_LU_EVENT_TYPES = LiveUpdate events.

Possible values are as follows:

1793 = LiveUpdate started

1794 = LiveUpdate succeeded

1795 = LiveUpdate failed

1796 = LiveUpdate manual task succeeded


270 System Report data table
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

1797 = LiveUpdate manual task failed

1798 = LiveUpdate retry started

1799 = LiveUpdate retry succeeded

1800 = LiveUpdate retry failed and will try again

1801 = LiveUpdate manual task started

1802 = LiveUpdate retry over max window

1803 = LiveUpdate retry failed and will try again

1804 = LiveUpdate retry pass scheduled time

1805 = LiveUpdate All process launched

1806 = LiveUpdate All process exited abnormally

1807 = LiveUpdate next server

1808 = LiveUpdate All process finished

1809 = LiveUpdate All process failed to launch

1810 = LiveUpdate uploading content

1811 = LiveUpdate file path does not exist

1812 = LiveUpdate Content Catalog file has been inserted

1813 = LiveUpdate Content Catalog file has been updated

1814 = Client package has been downloaded

1815 = Client package patching failed

1816 = New LiveUpdate content has been downloaded

1817 = LiveUpdate wrong URL parameter

1824 = Antivirus and antispyware definitions Win64 11.0


MicroDefsB.CurDefs failed to update

1825 = Download is current

1826 = LiveUpdate rerun is triggered by content catalog


update

1818 = Failed to download LiveUpdate content

1819 = LiveUpdate content cleaned up

1820 = Host Integrity template has been updated

1821 = LiveUpdate timed out


System Report data table 271
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

1822 = LiveUpdate schedule updated

SERVER_NET_AUDIT_EVENT_TYPES = Find unmanaged


computers events.

Possible values are as follows:

2049 = Search uncliented hosts started

2050 = Search uncliented hosts finished normally

2051 = Search uncliented hosts finished abnormally

2052 = Client remote started

2053 = Client remote finished normally

2054 = Client remote finished abnormally

SERVER_OTHER_EVENT_TYPES = Other events.

Possible values are as follows:

261 = Site created

262 = Package published

263 = Site license exceeded

272 = Server upgrade success

273 = Scheduled reporting failed

274 = Security risk rating summary

1281 = An unexpected exception has occurred

1282 = Connect mail server failed

1286 = Server error

For the Client Activity System log. For this log, this field
stores the hard-coded English string key that is located to
the left of the = sign. To the right are listed the events that
are queried by the group. The event IDs are in hex.

AGENT_SYSTEM_INSTALL_EVENT_TYPES = Installation
events.

Possible values are as follows:

0x12070001 = Internal error

0x12070101 = Install complete

0x12070102 = Restart recommended


272 System Report data table
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

0x12070103 = Restart required

0x12070104 = Installation failed

0x12070105 = Uninstallation complete

0x12070106 = Uninstallation failed

0x12071037 = Symantec AntiVirus installed

0x12071038 = Symantec Firewall installed

0x12071039 = Uninstall

0x1207103A = Uninstall rolled-back

AGENT_SYSTEM_SERVICE_EVENT_TYPES = Service events.

Possible values are as follows:

0x12070201 = Service starting

0x12070202 = Service started

0x12070203 = Service start failure

0x12070204 = Service stopped

0x12070205 = Service stop failure

0x1207021A = Attempt to stop service

AGENT_SYSTEM_CONFIG_EVENT_TYPES = Configuration
events.

Possible values are as follows:

0x12070206 = Configuration import complete

0x12070207 = Configuration import error

0x12070208 = Configuration export complete

0x12070209 = Configuration export error

AGENT_SYSTEM_HI_EVENT_TYPES = Host Integrity


events.

Possible values are as follows:

0x12070210 = Host Integrity disabled

0x12070211 = Host Integrity enabled

AGENT_SYSTEM_IMPORT_EVENT_TYPES = Import events.

Possible values are as follows:


System Report data table 273
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

0x12070214 = Successfully imported advanced rule

0x12070215 = Failed to import advanced rule

0x12070216 = Successfully exported advanced rule

0x12070217 = Failed to export advanced rule

AGENT_SYSTEM_CLIENT_EVENT_TYPES = Client events.

Possible values are as follows:

0x12070218 = Client Engine enabled

0x12070219 = Client Engine disabled

0x12071046 = Proactive Threat Scanning is not supported


on this platform

0x12071047 = Proactive Threat Scanning Load Error

AGENT_SYSTEM_SERVER_EVENT_TYPES = Server events.

Possible values are as follows:

0x12070301 = Server connected

0x12070302 = No server response

0x12070303 = Server connection failed

0x12070304 = Server disconnected

0x120B0001 = Cannot reach server

0x120B0002 = Reconnected server

AGENT_SYSTEM_PROFILE_EVENT_TYPES = Policy events.

Possible values are as follows:

0x12070306 = New policy received

0x12070307 = New policy applied

0x12070308 = New policy failed

0x12070309 = Cannot download policy

0x120B0005 = Cannot download policy

0x1207030A = Have latest policy

0x120B0004 = Have latest policy

AGENT_SYSTEM_AV_EVENT_TYPES = Antivirus engine


events.
274 System Report data table
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

Possible values are as follows:

0x12071006 = Scan omission

0x1207100B = Virus behavior detected

0x1207100C = Configuration changed

0x12071010 = Definition file download

0x12071012 = Sent to Quarantine Server

0x12071013 = Delivered to Symantec

0x12071014 = Security Response backup

0x12071015 = Scan aborted

0x12071016 = Symantec AntiVirus Auto-Protect load error

0x12071017 = Symantec AntiVirus Auto-Protect enabled

0x12071018 = Symantec AntiVirus Auto-Protect disabled

0x1207101A = Scan delayed

0x1207101B = Scan restarted

0x12071027 = Symantec AntiVirus is using old virus


definitions

0x12071041 = Scan suspended

0x12071042 = Scan resumed

0x12071043 = Scan duration too short

0x12071045 = Scan enhancements failed

AGENT_SYSTEM_LICENSE_EVENT_TYPES = License events.

Possible values are as follows:

0x1207101E = License warning

0x1207101F = License error

0x12071020 = License in grace period

0x12071023 = License installed

0x12071025 = License up-to-date

AGENT_SYSTEM_SECURITY_EVENT_TYPES = Security
events.

Possible values are as follows:


System Report data table 275
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

0x1207102B = Computer not compliant with security policy

0x1207102C = Computer compliant with security policy

0x1207102D = Tamper attempt

AGENT_SYSTEM_OTHER_EVENT_TYPES = Other events.

Possible values are as follows:

0x1207020A = Email post OK

0x1207020B = Email post failure

0x1207020C = Update complete

0x1207020D = Update failure

0x1207020E = Manual location change

0x1207020F = Location changed

0x12070212 = Old Rasdll detected

0x12070213 = Auto-update postponed

0x12070305 = Mode changed

0x1207030B = Cannot apply HI script

0x12070500 = System message from device control

0x12070600 = System message from anti-buffer overflow


driver

0x12071021 = Access denied warning

0x12071022 = Log forwarding error

0x12071044 = Client moved

For the Enforcer Activity System log. For this log, this field
stores the hard-coded English string key that is located to
the left of the = sign. To the right are listed the events that
are queried by the group. The event IDs are in hex.

ENFORCER_POLICY_MANAGER_EVENT_TY = Management
events.

Possible values are as follows:

0x101 = Connected to Symantec Endpoint Protection


Manager

0x102 = Lost connection to Symantec Endpoint Protection


Manager
276 System Report data table
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

0x103 = Applied policy downloaded from Symantec Endpoint


Protection Manager

0x104 = Failed to apply policy downloaded from Symantec


Endpoint Protection Manager

0x107 = Applied management server configuration

0x108 = Failed to apply management server configuration

ENFORCER_ENFORCER_EVENT_TYPES = Enforcer events.

Possible values are as follows:

0x201 = Enforcer started

0x202 = Enforcer stopped

0x203 = Enforcer paused

0x204 = Enforcer resumed

0x205 = Enforcer disconnected from server

0x301 = Enforcer failover enabled

0x302 = Enforcer failover disabled

0x303 = Enforcer in standby mode

0x304 = Enforcer in primary mode

0x305 = Enforcer short

0x306 = Enforcer loop

ENFORCER_ENABLE_EVENT_TYPES = Enable events.

Possible values are as follows:

0x401 = Forward engine pause

0x402 = Forward engine start

0x403 = DNS enforcer enabled

0x404 = DNS enforcer disabled

0x405 = DHCP enforcer enabled

0x406 = DHCP enforcer disabled

0x407 = Allow all enabled

0x408 = Allow all disabled

ENFORCER_PROFILE_EVENT_TYPES = Policy events.


System Report data table 277
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

Possible values are as follows:

0x501 = Seat number change

0x601 = Failed to create policy parser

0x602 = Failed to import policy downloaded from Symantec


Endpoint Protection Manager

0x603 = Failed to export policy downloaded from Symantec


Endpoint Protection Manager

0x701 = Incorrect customized attribute

EVENT_DESC nvarchar(255),
varchar(255), not null
278 System Report data table
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

MSG_ID varchar(255), not null


System Report data table 279
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

This field stores the hard-coded English string key that is


found to the left of the = sign. To the right is a description
of the kinds of error messages that are queried. % or blank
in this field means no filtering (all records).

For the Administrative System log.

Possible values are as follows:

ERR_SERVER = Server error messages

ERR_INVALID_PARAMETER = Invalid parameter error


messages

ERR_GENERAL = General error messages

ERR_ROOT = Root error messages

ERR_AUTHENTICATION = Login-related error messages

ERR_METADATA = Metadata error messages

ERR_TRANSACTION = Transaction error messages

ERR_DATASTORE = Datastore error messages

ERR_LICENSE = License error messages

ERR_CERTIFICATE = Certificate error messages

ERR_GROUP = Group error messages

ERR_FILE = File related error messages

ERR_LIVEUPDATE = LiveUpdate error messages

ERR_OTHER = Other error messages

ERR_NONE = None

For the Server Activity System log:

ERR_SERVER = Server error messages

ERR_INVALID_PARAMETER = Invalid parameter error


messages

ERR_GENERAL = General error messages

ERR_ROOT = Root error messages

ERR_AUTHENTICATION = Login-related error messages

ERR_METADATA = Metadata error messages

ERR_TRANSACTION = Transaction error messages


280 System Report data table
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

ERR_DATASTORE = Datastore error messages

ERR_LICENSE = License error messages

ERR_CERTIFICATE = Certificate error messages

ERR_GROUP = Group error messages

ERR_FILE = File related error messages

ERR_LIVEUPDATE = LiveUpdate error messages

ERR_OTHER = Other error messages

ERR_NONE = None

ENFORCERLIST Comma-separated Enforcer names by which to filter. nvarchar(255),


varchar(255), not null

ENFORCER_TYPE Possible values are as follows: int, null

0 = Gateway Enforcer

1 = LAN Enforcer

2 = DHCP Enforcer

3 = Integrated Enforcer

4 = NAP Enforcer

5 = Peer-to-Peer Enforcer

SERVERGROUPLIST Comma-separated domain names by which to filter. These nvarchar(255),


names can contain wildcard characters. varchar(255), not null

CLIENTGROUPLIST Comma-separated group names by which to filter. These nvarchar(255),


names can contain wildcard characters. varchar(255), not null

SITELIST Comma-separated site names by which to filter. These nvarchar(255),


names can contain wildcard characters. varchar(255), not null

PARENTSERVERLIST Comma-separated server names by which to filter. These nvarchar(255),


names can contain wildcard characters. varchar(255), not null

COMPUTERLIST Comma-separated computer names by which to filter. These nvarchar(512),


names can contain wildcard characters. varchar(512), not null

IPADDRESSLIST Comma-separated IP addresses by which to filter. These nvarchar(255),


names can contain wildcard characters. varchar(255), not null
System Report data table 281
System Report schema

Table 72-1 System Report schema (continued)

Database Field Name Comment Data Type

USERLIST Comma-separated user names by which to filter nvarchar(255),


varchar(255), not null

POLICYNAMELIST Comma-separated policy names by which to filter. These nvarchar(255),


names can contain wildcard characters. varchar(255), not null

EVENTSOURCELIST Comma-separated event names by which to filter. nvarchar(255),


varchar(255), not null

SORTORDER The column on which to sort for log views. varchar(32), not null

SORTDIR The sort direction. varchar(5), not null

Possible values are as follows:

Desc = Descending

Asc = Ascending

LIMITROWS The number of rows to use for pagination. int, not null

USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null

REPORT_IDX Not used. int, not null

REPORTINPUTS Special parameters if a report needs them. nvarchar(64), varchar(64),


not null

USN A USN-based serial number; this ID is not unique. bigint, not null

TIME_STAMP The time when this database record was entered or modified bigint, not null
in the database, in milliseconds since 1970.

DELETED The deleted flag of the schema object. tinyint, not null

Possible values are as follows:

0 = Deleted

1 = Not Deleted
282 System Report data table
System Report schema
Chapter 73
System State data table
This chapter includes the following topics:

■ System State schema

System State schema


Table 73-1 describes the database schema for system state information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_SYSTEM_STATE.

Table 73-1 System State schema

Database Field Name Comment Data Type

CHECKSUM The checksum of XML content. char(32), not null

CONTENT The XML content of the schema image, not null


object.

DELETED tinyint, not null

ID* The GUID of the schema object. char(32), not null

OWNER The GUID of the corresponding char(32), null


schema object.

TIME_STAMP The time that the database record was bigint, not null
modified; used to resolve the merge
conflicts.
284 System State data table
System State schema

Table 73-1 System State schema (continued)

Database Field Name Comment Data Type

TYPE The type name of the schema object. varchar(256), not null

USN The update serial number; used by bigint, not null


replication.

DOMAIN_ID The GUID of the domain that contains char(32), null


the state object.

RESERVED_INT1 int, null

RESERVED_INT2 int, null

RESERVED_BIGINT1 bigint, null

RESERVED_BIGINT2 bigint, null

RESERVED_CHAR1 char(32), null

RESERVED_CHAR2 char(32), null

RESERVED_varchar1 nvarchar(260), varchar(260), null

RESERVED_BINARY varbinary(2000), null


Chapter 74
Threat Report data table
This chapter includes the following topics:

■ Threat Report schema

Threat Report schema


Table 74-1 describes the database schema for threat report information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_THREATREPORT.

Table 74-1 Threat Report schema

Database Field Name Comment Data Type

THREATFILTER_IDX* Primary Key. char(32), not null

USER_ID The administrator GUID. char(32), not null

FILTERNAME The user-specified name for this saved 'report'. nvarchar(255),


varchar(255), not null

STARTDATEFROM The starting date. datetime, not null

STARTDATETO The ending date. datetime, not null


286 Threat Report data table
Threat Report schema

Table 74-1 Threat Report schema (continued)

Database Field Name Comment Data Type

RELATIVEDATETYPE Possible values are as follows: int, not null

0 = past week

1 = past month

2 = past three months

3 = past year

4 = past 24 hours

5 = current month

FILTER_TYPE Possible values are as follows: tinyint, null

1 = Risk

2 = Proactive Threat Protection

PRODUCT Not used. varchar(32), not null

EVENTTYPE The possibilities here are in the ALERTMSG table. varchar(32), not null

ACTUALACTION The possibilities here are in the ACTUALACTION varchar(32), not null
table.

SOURCE A hard-coded English lookup key. varchar(255), not null

Possible values are as follows:

Scheduled Scan

Manual Scan

Real Time Scan

Heuristic Scan

Console

Definition downloader

System

Startup Scan

Idle Scan

Manual Quarantine

SORTORDER The column to use for the log view sort. varchar(32), not null

SORTDIR Either 'asc' or 'desc'. varchar(5), not null


Threat Report data table 287
Threat Report schema

Table 74-1 Threat Report schema (continued)

Database Field Name Comment Data Type

TIMEBASE Deprecated. varchar(32), not null

TREATCOMPRESSED Deprecated. varchar(32), not null

SERVERGROUPLIST A comma-separated list of domains by which to nvarchar(255),


filter. These names can contain wildcard characters. varchar(255), not null

SERVERGROUPINCLUDE Whether to include (1) or exclude (0) the domains int, not null
in the list. Always set to 1.

CLIENTGROUPLIST A comma-separated list of client groups by which nvarchar(255),


to filter. These names can contain wildcard varchar(255), not null
characters.

CLIENTGROUPINCLUDE Whether to include (1) or exclude (0) the client int, not null
groups in the list. Always set to 1.

PARENTSERVERLIST A comma-separated list of Symantec Endpoint nvarchar(255),


Protection Manager servers by which to filter. These varchar(255), not null
names can contain wildcard characters.

PARENTSERVERINCLUDE Whether to include (1) or exclude (0) the servers in int, not null
the list. (Always set to 1.)

COMPUTERLIST A comma-separated list of computers by which to nvarchar(512),


filter. These names can contain wildcard characters. varchar(512), not null

COMPUTERINCLUDE Whether to include (1) or exclude (0) the computers int, not null
in the list. (Always set to 1.)

IPADDRESSLIST A comma-separated list of IP addresses by which nvarchar(255),


to filter. These names can contain wildcard varchar(255), not null
characters.

IPADDRESSINCLUDE Whether to include (1) or exclude (0) the IP int, not null
addresses in the list. (Always set to 1.)

CLIENTUSERLIST A comma-separated list of users by which to filter. nvarchar(255),


These names can contain wildcard characters. varchar(255), not null

CLIENTUSERINCLUDE Whether to include (1) or exclude (0) the users in int, not null
the list. (Always set to 1.)

HPP_APP_LIST A comma-separated list of heuristic risks by which nvarchar(255),


to filter. These names can contain wildcard varchar(255), not null
characters.
288 Threat Report data table
Threat Report schema

Table 74-1 Threat Report schema (continued)

Database Field Name Comment Data Type

THREATLIST A comma-separated list of risks by which to filter. nvarchar(255),


These names can contain wildcard characters. varchar(255), not null

THREATINCLUDE Whether to include (1) or exclude (0) the risks in int, not null
the list. (Always set to 1.)

THREATTYPELIST The possibilities here are in the VIRUSCATEGORY varchar(255), not null
table. It is no longer a list but a single item.

THREATTYPEINCLUDE Whether to include (1) or exclude (0) the risk types int, not null
in the list Always set to 1.

THREATCATEGORY Possible values are as follows: varchar(255), not null

= -1 = Unknown

>= 1 = Very low risk

>= 2 = Low risk

>= 3 = Moderate risk

>= 4 = Severe risk

>= 5 = Very Severe

LIMITROWS The number of rows to use for pagination. int, not null

USERELATIVE Use relative dates ('on') or absolute dates. char(2), not null

REPORT_IDX Not used. int, not null

REPORTINPUTS Special parameters if a report needs them. nvarchar(255),


varchar(255), not null

FROMUSERLIST Deprecated. nvarchar(255),


varchar(255), not null

FROMUSERINCLUDE Deprecated. int, not null

USN A USN-based serial number; this ID is not unique. bigint, not null

TIME_STAMP The time when this database record was entered or bigint, not null
modified in the database, in milliseconds since 1970.

DELETED Deleted row: tinyint, not null

0 = Not deleted

1 = Deleted
Threat Report data table 289
Threat Report schema

Table 74-1 Threat Report schema (continued)

Database Field Name Comment Data Type

FULL_CHARTS An administrator-specified list of charts to include varchar(255), not null


in the Comprehensive Risk Report.
290 Threat Report data table
Threat Report schema
Chapter 75
Version data table
This chapter includes the following topics:

■ Version schema

Version schema
Table 75-1 describes the database schema for version information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_VERSION.

Table 75-1 Version schema

Database Field Name Comment Data Type

PRODUCT* Primary Key. char(20), not null

VERSION The version of Reporting. char(10), not null

DBSCHEMA The schema version. int, not null

SR_NONCE For internal usage only. char(64), null


292 Version data table
Version schema
Chapter 76
Virus data table
This chapter includes the following topics:

■ Virus schema

Virus schema
Table 76-1 describes the database schema for virus information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_VIRUS.

Table 76-1 Virus schema

Database Field Name Comment Data Type

VIRUSNAME_IDX* Primary Key, Index of virus / threat. char(32), not null

VIRUSNAME The name of the virus / threat nvarchar(255), varchar(255),


not null

CATEGORY The current category (as downloaded from int, not null
Symantec's Web site ). Values are 1 through 5,
where 1 is very low and 5 is very severe. A value
of -1 means unknown or not applicable. This
rating applies only to viral threats.
294 Virus data table
Virus schema

Table 76-1 Virus schema (continued)

Database Field Name Comment Data Type

MAXCATEGORY The maximum category that the virus has int, not null
reached. Values are 1 through 5. A value of -1
means unknown or not applicable. This rating
applies only to viral threats.

TYPE The threat type. int, null

Possible values are as follows:

0 = Viral

1 = Non-Viral malicious

2 = Malicious

3 = Antivirus - Heuristic

4 = Security risk

5 = Hack tool

6 = Spyware

7 = Trackware

8 = Dialer

9 = Remote access

10 = Adware

11 = Jokeware

12 = Client compliancy

13 = Generic load point

14 = Proactive Threat Scan - Heuristic

15 = Cookie
Virus data table 295
Virus schema

Table 76-1 Virus schema (continued)

Database Field Name Comment Data Type

TYPE2 The threat location. int, null

Possible values are as follows:

0 = Boot virus

1 = File virus

2 = Mutation virus

3 = Macro virus

4 = File virus

5 = File virus

6 = Memory virus

7 = Memory OS virus

8 = Memory mcb virus

9 = Memory highest virus

11 = Virus behavior

12 = Virus behavior

13 = Compressed file

14 = Heuristic

DISCOVERED When Symantec first discovered the threat (as datetime, not null
downloaded from Symantec's Web site ).

VID The unique identifier for a virus that Security bigint, not null
Response sets.

USN A USN-based serial number; this ID is not unique. bigint, not null

TIME_STAMP The time when this database record was entered bigint, not null
or modified in the database, in milliseconds since
1970.

DELETED Deleted row: tinyint, not null

0 = Not deleted

1 = deleted

PATTERN_IDX Pointer to the Pattern table that protects against char(32), not null
this threat.
296 Virus data table
Virus schema

Table 76-1 Virus schema (continued)

Database Field Name Comment Data Type

TOP_THREAT Possible values are as follows: tinyint, not null

0 = Not a top threat

1 = top threat

LATEST_THREAT 0 = not a latest threat tinyint, not null

1 = latest threat

STEALTH Assesses how easy it is to determine if a security int, not null


risk is present on a computer.

Possible values are as follows:

0 = No rating

1,2 = Low

3 = Medium

4> = High

-1 means not applicable. This rating applies only


to non-viral threats.

REMOVAL Skill level that is required to remove the threat int, not null
from a given computer.

Possible values are as follows:

0 = No rating

1, 2 = Low

3 = Medium

4 >= High

-1 means not applicable. This rating applies only


to non-viral threats.
Virus data table 297
Virus schema

Table 76-1 Virus schema (continued)

Database Field Name Comment Data Type

PERFORMANCE Measures the negative impact that the presence int, not null
of a security risk has on the computer's
performance.

Possible values are as follows:

0= No rating

1,2= Low

3= Medium

4>= High

-1 means not applicable. This rating applies only


to non-viral threats.

PRIVACY The level of privacy that is lost due to the int, not null
presence of a security risk on a computer.

Possible values are as follows:

0= No rating

1, 2 = Low

3 = Medium

4 >= High

-1 means not applicable. This rating applies only


to non-viral threats.

DEPENDENCY The number of dependent components that the int, not null
risk installs.

Possible values are as follows:

0 = No rating

1, 2 = Low

3 = Medium

4 >= High

-1 means not applicable. This rating applies only


to non-viral threats.

OVERALL An average of all the security risk ratings. This int, not null
rating applies only to non-viral threats.
298 Virus data table
Virus schema
Chapter 77
Virus Category data table
This chapter includes the following topics:

■ Virus Category schema

Virus Category schema


Table 77-1 describes the database schema for virus category information.
If a Data Type cell contains one data type value, the value applies to both the MS
SQL Server and the embedded database. If there are two data type values, the first
value applies to MS SQL Server and the second value applies to the embedded
database.
An asterisk (*) by a database field name indicates that the field acts as a Primary
Key, PK_VIRUSCATEGORY.

Table 77-1 Virus Category schema

Database Field Name Comment Data Type

CATEGORY* Primary key. int, not null


300 Virus Category data table
Virus Category schema

Table 77-1 Virus Category schema (continued)

Database Field Name Comment Data Type

CATEGORY_DESC Category, Category_Desc. An English varchar(255), not null


string key that is used for a lookup

Possible values are as follows:

0 = Viral

1 = Non-Viral malicious

2 = Malicious

3 = Heuristic

4 is no longer used

5 = Hack tool

6 = Spyware

7 = Trackware

8 = Dialer

9 = Remote access

10 = Adware

11 = Jokeware

12 = Client compliancy

13 = Generic load point

14 = ApplicationHeuristic

15 = Cookie
Chapter 78
Database Schema Views
This chapter includes the following topics:

■ Purposes of views

Purposes of views
The database contains a number of views to enable you to look at the tables in
different ways. The view names begin with the letter V to distinguish them from
the tables. The following table lists these views and the purpose of each.

Table 78-1 Purposes of views

View Purpose

V_AGENT_BEHAVIOR_LOG Query client activities for agents.

V_AGENT_PACKET_LOG Query packet traffic events for agents.

V_AGENT_SECURITY_LOG Query security events for agents.

V_AGENT_SYSTEM_LOG Query system events for agents.

V_AGENT_TRAFFIC_LOG Query traffic events for agents.

V_ALERTS Query risk and TruScan events with human-readable IP address


information.

V_ENFORCER_CLIENT_LOG Query client activities for Enforcers.

V_ENFORCER_SYSTEM_LOG Query system activities for Enforcers.

V_ENFORCER_TRAFFIC_LOG Query traffic activities for Enforcers.

V_LAN_DEVICE_DETECTED Query detected devices with human-readable IP address


information.
302 Database Schema Views
Purposes of views

Table 78-1 Purposes of views (continued)

View Purpose

V_LAN_DEVICE_EXCLUDED Query known devices with human-readable IP address


information.

V_NETWORK_SCAN_RESULT Query network scan results with human-readable IP address


information.

V_SECURITY_VIEW Query cross-technology security events.

V_SEM_COMPUTER Query computer information with human-readable IP address


information.

V_SERVER_ADMIN_LOG Query administrator activities for servers.

V_SERVER_CLIENT_LOG Query client activities for servers.

V_SERVER_ENFORCER_LOG Query Enforcer activities for servers.

V_SERVER_POLICY_LOG Query policy change activities for servers.

V_SERVER_SYSTEM_LOG Query system activities for servers.

You might also like