beta_symantec_system_console = { # The name of the log format log.format.format_label = "Symantec System Console Log Format (BETA)" log.miscellaneous.log_data_type = "csv" log.miscellaneous.log_format_type = "other" # The log is in this format if any of the first ten lines match this regular expression log.format.autodetect_regular_expression = "^Risk,Action,Count,Filename,Threat Type,Original Location,Computer,User,Status,Current Location,Primary Action,Secondary Action,Logged By,Action Description,Date" log.fields.time = "" database.numerical_fields = { events = { label = "$lang_stats.field_labels.events" default = true requires_log_field = false type = "int" display_format_type = "integer" entries_field = true } # events } # database.numerical_fields log.parsing_filters.parse = ` if (matches_regular_expression(date, '^([0-9]+/[0-9]+/[0-9]+) ([0-9]+:[0-9]+)$')) then ( date = $1; time = $2; ) ` log.filters = { mark_entry = { label = '$lang_admin.log_filters.mark_entry_label' comment = '$lang_admin.log_filters.mark_entry_comment' value = 'events = 1;' } # mark_entry } # log.filters create_profile_wizard_options = { # How the reports should be grouped in the report menu report_groups = { date_time_group = "" } # report_groups } # create_profile_wizard_options } # beta_symantec_system_console