# Copyright (c) 2010 Flowerfire, Inc. All Rights Reserved. symantec_system_console = { plugin_version = "1.0" # 2007-09-14 - 1.0 - KBB - added version number and changed file name from # beta_symantec_system_console.cfg # The name of the log format log.format.format_label = "Symantec System Console Log Format" log.miscellaneous.log_data_type = "csv" log.miscellaneous.log_format_type = "other" # The log is in this format if any of the first ten lines match this regular expression log.format.autodetect_regular_expression = "^Risk,Action,Count,Filename,Threat Type,Original Location,Computer,User,Status,Current Location,Primary Action,Secondary Action,Logged By,Action Description,Date" log.fields.time = "" database.numerical_fields = { events = { label = "$lang_stats.field_labels.events" default = true requires_log_field = false type = "int" display_format_type = "integer" entries_field = true } # events } # database.numerical_fields log.parsing_filters.parse = ` if (matches_regular_expression(date, '^([0-9]+/[0-9]+/[0-9]+) ([0-9]+:[0-9]+)$')) then ( date = $1; time = $2; ) ` log.filters = { mark_entry = { label = '$lang_admin.log_filters.mark_entry_label' comment = '$lang_admin.log_filters.mark_entry_comment' value = 'events = 1;' } # mark_entry } # log.filters create_profile_wizard_options = { # How the reports should be grouped in the report menu report_groups = { date_time_group = "" } # report_groups } # create_profile_wizard_options } # symantec_system_console