User-defined columns

Up to four user-defined columns can be configured for each log source during log file processing, and can be used to substitute column data, or to obtain data from columns that are normally skipped.

User-defined columns are also used when repopulating database columns during database maintenance.

User-defined columns do the following:

  • Include skipped log field data — During log file processing, some log file fields are skipped. For example, log file processing skips the McAfee® Web Gateway Referrer and Policy name fields. Up to four user-defined columns are available to pull data from the skipped fields.
  • Assign a custom value to column data — To easily find and review in reports, substitute standard column data with a custom string value. For example, you want to assign test-lab to all IP addresses beginning with 115, and assign other to any additional IP addresses. In the report, the user-defined column displays either test-lab or other in place of the numeric IP address values. Content Security Reporter treats newly created user-defined columns as an additional column and leaves the original column and data in the log file. Using the previous example of substituting IP addresses, the original IP address column data remains unchanged and is still available to use in reports.
Note: When entering a value in the Log file header value box, do not use quotation marks.