USM Central System Events List View

Role Availability Read-Only Analyst Manager

USM Central provides a centralized view of your system events Any traffic or data exchange detected by LevelBlue products through a sensor or external devices such as a firewall.. Go to Settings > System Events.

The system events page displays information on any events generated within your environment. On the left you can find the search and filters options. In the upper-left side of the page, you can see any filters you have applied, and you have the option to create and select different views of the system events. The main part of the page is the actual list of system events. Each row describes an individual system event.

If you want to analyze the data, you can maximize the screen and hide the filter pane. Click the icon to hide the filter pane. Click the icon to expand the filter pane.

Note: By default, the list will display all System Events created during the last 24 hours.

The following table displays the list of the default columns found in the List view.

List of the Default Columns in the System Events Page
Column Field Name Description
Event Name Name of the event.
Time Created The date and time of the creation of the event. The displayed date depends on your computer's time zone.
Source Address

IP address of the event or computer that it takes place on.

Source Email of the user that the action is being performed on. For example, if user modifies or creates user, then the destination email is
Affected Resource Email of the user that performed the action. For example, when user logs in, the source email is
Event outcome

Indicates if the action was success and completed or if it failed.

Event Details

It is a small description of what was changed in the system event.

It only gets populated for certain actions and indicates what is being changed. Most of these are user changes (for example, when a user is suspended, a locked status is reset, MFA A method of access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism – typically at least two of the following categories: knowledge, possession, and inherence. is enabled or disabled, or a password is updated.

Click the icon to bookmark an item for quick access.

Note: You can view your bookmarked items by going to the secondary menu and clicking the icon. This will display all of your bookmarked items and provide direct links to each of them.

You can choose the number of items to display by selecting 20, 50, or 100 below the table. You can classify some columns by clicking the icons to the right side of the heading. You can sort the item information in ascending or descending order.