1 - not shown in the event log 2 - violation of BOT of audit events (e.g., it is edged manually) 3 - violation of EOT of audit events (e.g., it is edged manually) 4 - some audit events are absent (e.g., they are deleted manually) 5 - table entry is changed 6 - inactive log (no events or log update mark) /// External events 7 - user is added 8 - user is deleted 9 - user parameters are changed 10 - role is added 11 - role is deleted 12 - role parameters are changed 13 - user login 14 - user logout 15 - device is added 16 - device is deleted 17 - device parameters are changed 18 - detection is added 19 - detection is deleted 20 - detection parameters are changed 21 - archive is added 22 - archive is deleted 23 - archive parameters are changed 24 - detection rule (macro) is created 25 -Â detection rule (macro) is deleted 26 - detection rule (macro) parameters are changed 27 - alarm is triggered 28 - zone is armed 29 - zone is disarmed 30 - export from archive is performed 31 - notification sender (sound-, email-, sms-) is added 32 - notification sender is deleted 33 - notification sender parameters are changed 34 - general parameter is changed 35 - recording to the archive parameters are changed 36 - agent of export is added 37 - agent of export is deleted 38 - agent of export parameters are changed 39 - macro is created 40 - macro is deleted 41 - macro parameters are changed 42 - alarm is processed by user 43 - dangerous alarm 44 - suspicious alarm 45 - false alarm 46 - skipped alarm 47 - Server is included into AxxonC-Werk-domain 48 - Server is excluded from AxxonC-Werk-domain 49 - view archive 50 - view camera 51 - view layout 52 - forensic search in the archive 53 - area search by faces in the archive 54 - area search by license plates in the archive 55 - system log export 56 - LDAP folder is added 57 - LDAP folder is deleted 58 - LDAP folder parameters are changed |