Event notification settings give you a choice of methods for configuring and composing a message text.
To configure event notification settings:
The Logs and notifications settings window opens.
You can only configure user notifications for the following events: Object detected, Untrusted external device detected and restricted event, and Network session listed as untrusted event.
You can create the same message for several event types: after selecting a notification method for one event type, use the Ctrl or Shift key to select the other event types for which you want to use the same message, and then click the Message text button.
If you want to apply user account authentication when connecting to the SMTP server, select Authentication settings in the Use SMTP authentication group and specify the name and password of the user whose user account will be authenticated.
System environment variables can be used when the path to the executable file is specified; user environment variables are not allowed.
If you wish to limit the number of messages of one event type over a period of time, on the Advanced tab, select Do not send the same notification more than and specify the number of times and a time interval.
The configured notification settings are saved.
Fields with event information
Variable |
Description |
|---|---|
%EVENT_TYPE% |
Event type. |
%EVENT_TIME% |
Event time. |
%EVENT_SEVERITY% |
Importance level. |
%OBJECT% |
Object name (in Real-Time Computer Protection and On-Demand Scan tasks). The Software Modules Update task includes the name of the update and the address of the web page with information on the update. |
%VIRUS_NAME% |
The name of the object according to the Virus Encyclopedia classification. This name is included in the full name of a detected object that Kaspersky Industrial CyberSecurity for Nodes returns on detecting an object. You can view the full name of a detected object in the task log. |
%VIRUS_TYPE% |
The type of detected object according to the Kaspersky classification, such as "virus" or "trojan". It is included in the full name of a detected object, which is returned by Kaspersky Industrial CyberSecurity for Nodes when it finds an object infected or probably infected. You can view the full name of a detected object in the task log. |
%USER_COMPUTER% |
In Real-time File Protection tasks, the name of the protected device of the user who accessed the object on the device. |
%USER_NAME% |
In Real-Time File Protection tasks, the name of the user who accessed the object on the device. |
%FROM_COMPUTER% |
Name of the protected device where the notification originated. |
%EVENT_REASON% |
Reason the event occurred (some events do not have this field). |
%ERROR_CODE% |
Error code (only for the "internal task error" event). |
%TASK_NAME% |
Task name (only for events related to task performance). |