Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 3002 Source: AntigenInternet

Internet scan found virus:
Folder: SMTP Messages\<direction>
Message: <snippet from start of body>
File: <location of virus>
Incident: <virus name>
State: <state>
This event is generated by the Sybari Antigen program when it finds a virus. <direction> can be either Inbound, Outbound, or Internal, depending on which mail queue it found the virus in. <virus name> will either be the name of the Virus found, or in the case that the mail message matched one of the keyword or spam block lists, the offending keyword. <state> is either "Purged" or "Quarantined" depending on the options selected in the Antigen program.
“ExceedinglyNested” is the value Antigen returns when it encounters a compressed file that contains more than the pre-set number of nested compressed files. This value is set to 5 by default but may be changed in the registry setting "MaxNestedCompressedFiles". See Sybari Knowledge Base for more details.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.