Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Expand

1 - not shown in the event log
2 - violation of BOT of audit events (e.g., it is edged manually)
3 - violation of EOT of audit events (e.g., it is edged manually)
4 - some audit events are absent (e.g., they are deleted manually)
5 - table entry is changed
6 - inactive log (no events or log update mark)
/// External events
7 - user is added
8 - user is deleted
9 - user parameters are changed
10 - role is added
11 - role is deleted
12 - role parameters are changed
13 - user login
14 - user logout
15 - device is added
16 - device is deleted
17 - device parameters are changed
18 - detection is added
19 - detection is deleted
20 - detection parameters are changed
21 - archive is added
22 - archive is deleted
23 - archive parameters are changed
24 - detection rule (macro) is created
25 - detection rule (macro) is deleted
26 - detection rule (macro) parameters are changed
27 - alarm is triggered
28 - zone is armed
29 - zone is disarmed
30 - export from archive is performed
31 - notification sender (sound-, email-, sms-) is added
32 - notification sender is deleted
33 - notification sender parameters are changed
34 - general parameter is changed
35 - recording to the archive parameters are changed
36 - agent of export is added
37 - agent of export is deleted
38 - agent of export parameters are changed
39 - macro is created
40 - macro is deleted
41 - macro parameters are changed
42 - alarm is processed by user
43 - dangerous alarm
44 - suspicious alarm
45 - false alarm
46 - skipped alarm
47 - Server is included into AxxonC-Werk-domain
48 - Server is excluded from AxxonC-Werk-domain
49 - view archive
50 - view camera
51 - view layout
52 - forensic search in the archive
53 - area search by faces in the archive
54 - area search by license plates in the archive
55 - system log export
56 - LDAP folder is added
57 - LDAP folder is deleted
58 - LDAP folder parameters are changed

...