Alert Rule Conditions for Altiris™ Event Console 7.0 from Symantec

Article:DOC1738  |  Created: 2009-01-21  |  Updated: 2009-01-21  |  Article URL
Article Type


You can create alert matching rules that contain conditions, such as the alert type or the date an alert is received. Alert Matching rules let you identify specific alerts as the Event Console receives them. These rules can be used when you launch tasks, forward alerts, and block alerts from being received. You can use conditions in combinations to create complex rules. For example, a sequence of conditions could be composed as as follows:

where Alert Category equals Environmental and Alert Host Name contains My-Host and Alert Time of Day after 3:00 am and Alert Time of Day before 4:00 am

You can match alerts by using the following condition types:

Alert Rule Condition Types

Condition Description
Alert Category The category of an alert.
Alert Collection The resource or collection (in which the resource resides) of an alert.
Alert Date The date an alert is raised (can be used in pairs to indicate a date range).
Alert Day Of Week The day of the week an alert is raised, Sunday through Saturday (can be used in pairs to indicate a day of week range).
Alert Definition The PPA alert definition of the alert.
Alert Frequency The number of duplicate alerts and, optionally, the duration or period of time (in seconds).
Alert Host name (or IP) The hostname or IP address of the resource that raised the alert.
Alert Message The text message of the alert.
Alert Product The product GUID of the NS Solution that raised the alert.
Alert Protocol The protocol from which the alert originated.
Alert Severity The severity level of the alert.
Alert Time of day The date and time that the alert originated.
Alert Unknown Host Whether or not the resource that raised the alert is known to NS.
Alert Variable The key-value pair variable data in the alert (SNMP varbinds, metrics, etc).

Legacy ID


Article URL

Terms of use for this information are found in Legal Notices