Security actions
The Security Actions view allows you to add, modify, and delete actions that can be associated to an alarm. If the action is selected, it can be executed automatically or manually, depending on the security rule configuration.
Settings
Field |
Definition |
||
---|---|---|---|
Add Filter |
Allows you to select a field from the current view to filter information. Select the field from the drop-down list, and then enter the information you wish to filter. See Filters. |
||
Update |
Displays the filtered data in the table. |
||
Table columns |
|||
Name |
User defined name for the action. The type of action that will occur if the rule is enabled. |
||
Activity Failure |
Indicates whether the system will continue to perform activities for the action if a higher- ranked activity fails. When Continue Running Activities is selected, the next ranked activity in the list is performed after a higher-ranked activity fails. When Stop Running Activities is selected, no lower-ranked activities are executed when a higher-ranked activity fails. |
||
Secondary Task Delay |
The amount of time that will pass before the enabled secondary activity is executed for an activity. For example, the user may wish to enable the host 15 minutes after the host was initially disabled. |
||
Activity Summary |
A description of the activity that will occur. |
||
Last Modified By |
User name of the last user to modify the action. |
||
Last Modified Date |
Date and time of the last modification to this action. |
||
Right click options |
|||
Delete |
Deletes the selected action. |
||
Modify |
Opens the Modify Security Action window for the selected action. |
||
Show Audit Log |
Opens the admin auditing log showing all changes made to the selected item. For information about the admin auditing log, see Admin auditing.
|
||
Buttons |
|||
Export |
Exports the data displayed to a file in the default downloads location. File types include CSV, Excel, PDF, or RTF. See Export data. |