Columns in Results Panel/Custom Report, Application Control

You can control how column information for log entries is displayed in the Results panel, from the Template settings dialog.

The following table describes the log entry information for columns in the Results panel and custom reports.

Ellipses (…) in the Results panel indicate hidden log entries. For example, if you group a set of results using the value in one column, then multiple values in other columns, the results are shown as […].

Column

Description

Audit Event

Shows the type of event that triggered the audit log.

Audit Type

Shows the type of action the administrator carried out. The can be Device Control, Application Control, or Unspecified.

Computer

Shows the name of the computer where file access was requested.

Count

Shows the number of log entries hidden in a single row, accompanied by a grouping symbol displayed on the column header. Alternatively, The may be a computed column of data.

Custom Message

Indicates the reason the application is running or not running. For example, although authorized, the file may not run because the computer is in non-blocking mode or because there is a file path rule authorization.

File Ext

Shows the file extension.

File Group

Shows the file group the executable, script, macro, or file containing a VBA macro assignment. The can also be shown as <Not Authorized>.

File Name

Shows the file that access was authorized or denied for.

File Name (full)

Shows the full name (including path) of the file that access was authorized or denied.

File Path

Shows the file path for the file that access was authorized or denied.

File Type

Indicates whether the file relates to a script or an application, for example Executable or Script.

Hash

Shows the digital signature of the file, created by SHA-1 (Secure Hash Algorithm -1) that differentiate files with the same name.

NT Account Name

Domain user name of the person who triggered the event, for example MARVIN/johns or LocalSystem.

Other

Shows additional information for an audit event, such as, when an administrator erases a scheduled permission. The column may also show parameters.

Reason

Indicates whether an action was granted or denied. Possible values: GRANTED, DENIED, NOPERMISSIONS, LOCALAUTH, QUOTAEXCEED, NON-ENCRYPTED, SANCTUARY-ENCRYPTED, PGP-ENCRYPTED, OVERRIDESHADOW-CONFIGURED.

SID

Shows the secondary identifier for the user, for example S-1-5-21-647365748-5676349349-7385635473-1645. The is useful when attributing actions recorded in log files to users who have left your organization.

Target

Shows the device name for which the permissions were modified.

Target Computer

Shows the name of the computer that was the target of the administrator action.

Target User

Shows the name of the user or group that the administrator action was applied.

Traced On (Console time)

Shows the date the event occurred on the console computer.

Traced On (Endpoint time)

Shows the date the event occurred on the client computer.

Traced On (UTC)

Shows the date (Coordinated Universal Time) the event occurred on the client computer.

Transferred On (Console)

Shows the date the event record was transferred from the client computer to the Ivanti Device and Application Control Application Server.

Transferred On (UTC)

Shows the date (Coordinated Universal Time) the event record was transferred from the client computer to the Ivanti Device and Application Control Application Server.

Type

Shows the cause of the event that triggered the log. The can be Execution Granted, Execution Denied, or the type of audit event.

User

Shows the name of the user who triggered the event. For users removed from the Active Directory, The field displays the SID, enabling the person who triggered an event to be identified after they have left your organization.

X.500 User Name

Shows the user name in Lightweight Directory Access Protocol format. The reflects the directory tree in which the user information is stored. For example, the X.500 user name may be CN=John Smith, CN=Users,or DC=Marvin.

Columns with names starting Count, Min, Max, Sum and Average may also be displayed. These contain computed data based on the values in the specified columns.

The Custom Message field displays one of the following values which are affected by the system-wide option settings for Execution Blocking and the logging mode:

Value

Description

Authorized

The file is known, its digital signature is recorded in the Ivanti Device and Application Control database. If The file is assigned to a file group, The is also shown.

Denied

The file was not allowed to run because it was not centrally or locally authorized.

Logon

The file was allowed to run because Relaxed logon default option is enabled.

ok-dllDontCare

The *.dll execution was authorized because the Execution Blocking option was set to Ask user for *.exe only.

ok-hash

The file ran and the action was logged because the option to Log Everything is enabled. The option should only be set for a limited period, or else the system generates an unmanageable amount of data.

ok-localAuth

The file is not centrally authorized, but the user was prompted for local authorization.

ok-nonBlocking

The file ran because the Non-Blocking option was enabled.

ok-nonBlockUsr

The file is not centrally authorized, but ran because the Non-Blocking option was enabled for a user or group of users.

ok-pathRule

The file was allowed to run because it matched a path rule.