The Microsoft Vulnerability action deals with the expression of event information pertaining to the discovery of vulnerabilities related to Microsoft products. Examples include ISA server 2000 and proxy Server 2.0 Internet Content spoofing, Microsoft Office vulnerabilities, Windows RAS overflow, and so forth.
|
Information |
Level |
|---|---|
|
Source - User Information |
Secondary |
|
Source - Host Information |
Secondary |
|
Source - Object Information |
Tertiary |
|
Source - Process Information |
Tertiary |
|
Source - Group Information |
Tertiary |
|
Dest - User Information |
Tertiary |
|
Dest - Host Information |
Primary |
|
Dest - Object Information |
Primary |
|
Dest - Group Information |
Tertiary |
|
Agent - Information |
Primary |
|
Agent - Host Information |
Primary |
|
Event Source - Host Information |
Primary |
|
Event Source - Information |
Tertiary |
|
Event - Information |
Primary |
|
Result - Information |
Primary |
|
Result |
event_result |
event_severity |
|---|---|---|
|
Failure |
F |
3 |
|
Success |
S |
4 |
| Copyright © 2010 CA. All rights reserved. | Email CA Technologies about this topic |