Audit log information: CylancePROTECT Desktop
CylancePROTECT Desktop
The following table lists the information that is added to the audit log for
CylancePROTECT Desktop
administrative actions. You can use the filtering options in the console to filter the audit log results.Category | Action | Details |
---|---|---|
Application Setting | Custom Authentication Disable | Custom authentication disabled. |
Application Setting | Custom Authentication Save | Custom authentication saved: { <configuration_settings> } |
Application Setting | Require Password to Uninstall Agent Save | Password to uninstall agent saved. |
Application Setting | Require Password to Uninstall Agent Disable | Require password to uninstall agent disabled. |
Application Setting | Installation Token Delete | Installation token was deleted. |
Application Setting | Installation Token Regenerate | Installation token was generated. |
Global List | Add | Source: CylancePROTECT; SHA256: <file hash> ; FileName: <name> ; Reason: <value> ; Added to: Global Quarantine or Safe List; Category: <value> |
Global List | Remove | SHA256: <file hash> |
Script Global List | Add | Source: CylancePROTECT; SHA256: <file hash> ; FileName: <name> ; Reason: <value> ; Added to: Script Control Exclusion List |
Script Global List | Remove | SHA256: <file hash> |
Threat | Safe List | SHA256: <file hash> ; Category: <value> ; Reason: <value> |
Threat | Global Quarantine | Source: CylancePROTECT; SHA256: <file hash> ; Reason: <value> |
Threat Data Report | Generate Token | — |
Threat Data Report | Delete Token | — |