After you have installed the tool, run LogParser. For example, you might run the following command to import all information into a. Each entry in the log has a UTC timestamp. Because the protection service runs on multiple servers across multiple data centers, sometimes the logs might seem to be out of sequence, even when they are sorted by their timestamp. However, the difference is small and usually within a minute. In most cases, this is not an issue that would be a problem for log analysis.
The first line identifies that these are protection logs from Azure Information Protection. The second line identifies that the rest of the blob follows the version 1. We recommend that any applications that parse these logs verify these two lines before continuing to parse the rest of the blob.
Fields: date time row-id request-type user-id result correlation-id content-id owner-email issuer template-id file-name date-published c-info c-ip admin-action acting-as-user.
Each of the subsequent lines is a log record. The values of the fields are in the same order as the preceding line, and are separated by tabs. Use the following table to interpret the fields. Although the user-id field usually indicates the user who made the request, there are two exceptions where the value does not map to a real user:.
For example, na represents North America, eu represents Europe, and ap represents Asia. There are many request types for the protection service but the following table identifies some of the most typically used request types.
Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Contents Exit focus mode. Is this page helpful? Please rate your experience Yes No. Any additional feedback? Note To provide a unified and streamlined customer experience, the Azure Information Protection classic client and Label Management in the Azure Portal are deprecated as of March 31, Submit and view feedback for This product This page.
View all page feedback. Windows 7: System Security Protection. Windows 7 System Recovery. Windows 7 Forefront Client Security. Network Connection List with FPort v2. VirusScan Enterprise 8. VirusScan Enterprise Startup Programs. Spybot - Spyware Blocker, Detection and Removal. Keeping Firefox Secure.
Here is the batch code I used for the copy process. Posted by: ms01ak 8 years ago. Answer this question. Posted by:. Don't be a Stranger! Sign up! This is single cheat sheet with details of most commonly used log files. I know that there are many discussion and McAfee KB available with similar details.
But this Information will serve as quick reference guide Instead of reading through number of pages in Internet. Note: All the products referred here are of McAfee enterprise type and not home user products. This post will help you with log file names and locations of following McAfee products.
If I get a chance in feature, will do verify, test and try to add more products.
0コメント