Reference Guide

Navigate the Dell Server
94
Modifed
Repaired tampering
Tampering was detected in the wrapper of t
he protected Office
document, which contains the cover page that opens in the cloud or
on a device that does not have Dell Data Guardian. Dell Data
Guardian repaired the wrapper or cover page.
Attempt Access
Request Access
An external user requested
a key for a file to which they do not have
access or the access time has expired. Audit data includes User
account, timestamp, filename, keyID, and geolocation if enabled by
policy.
Modifed
Unprotected:
A Mac user unprotected a protected Office fil
e.
Windows - opt-in mode only.
(Opt-in mode)
Deleted
(Mac only)
Deleted
T
he user deleted a .xen file from the cloud sync folder.
Accessed
(Mobile only)
Geo Blocked
A user outside the geofence tried to access a protected document,
and the attempt was blocked.
Column options for System (protected Office documents and Windows)
Login and Logout actions relate to the system, so they have no corresponding Data Guardian action.
Audit Event
- Column options Description
Login
If a user logged in and did a fast-user switch, for example, logged in and then rebooted.
Logout
User logged out of a session.
Column options for Beacon only (protected Office documents)
Audit Event
- Column options Description
Column options related to geolocation:
IP
Address
Routable
Geo Type
Latitude
Longitude
IP Address - When a Beacon event comes in and the Beacon server can determine the
location of the event, it lists the IP address.
Routable - True or False
If True, geolocation data should exist for that IP address and will identify the
device's latitude and longitude based on each operating system's APIs.
Note: If the Routable column lists True, but no geolocation data displays, an error
occurred.
If False, the IP address is non-routable.
Latitude and longitude -
The data visualization is based on these coordinates rather than a
street address. Usually, the map visualization displays the location of the device. If a user
accesses the computer remotely and neither GPS or WiFi is available, the map visualization
may display the location based on the remote computer's VPN IP address. The column lists
the coordinates as plus (+) or minus (-), correlating to North, South, East, or West.
Geo Type - Typically, this is Point.
Column options for Cloud Encryption only
A
udit Event - Column options Description
Provider
Cloud storage provider.
Cloud Name
The .xen file name (if a policy creates a GUID, you can see the filename here).
Cloud Action
If a service acts on a .xen file, the Cloud Action column lists the reason. See
Cloud_Encryption_audit events.