Product guide

Guide to User-Defined Columns
On the User-Defined Columns tab
, you can substitute column data values with a string that is more
recognizable for you and get data from log file fields that might normally be skipped.
The User-Defined Columns feature is separate from the Custom Columns feature, but is also used during log
file processing to substitute column data or obtain data from columns that are normally skipped during
this process. User-defined columns are also used when repopulating database columns during
database maintenance. You can configure up to four user-defined columns for each log source.
User-defined columns do the following:
Include skipped log field data — During log file processing in Content Security Reporter, some log
file fields are skipped. For example, log file processing skips the Referrer field or the McAfee Web
Gateway Policy name field. When you want your reports to include data from any skipped fields in
reports, you can configure user-defined columns to get the data from the skipped fields. That data
is then available for use in reports.
Assign a custom value to column data — Substitute standard column data with a custom string
value to make it easier to find and review in reports. For example, you want to assign test-lab to all
IP addresses beginning with 115 and assign other to any additional IP addresses. In the report, the
user-defined column displays either test-lab or other in place of the numeric value of IP addresses.
When you create a user-defined column, Content Security Reporter treats this as an additional
column and leaves the original column and original data in the log file. Using the previous example
of substituting IP addresses, the original IP address column data remains unchanged and is still
available for use in reports.
Figure 5-1 New Log Source — User-Defined Columns options
Configure user-defined
columns
You can use up to four user-defined columns for each log source. The user-defined columns rules are
used when log files are processed for the log source.
Before you begin
Configure rule sets for the user-defined columns.
5
Log sources and log formats
Log Sources
page
38
McAfee Content Security Reporter 1.0.0 Software Product Guide