How to troubleshoot ePolicy Orchestrator event and report content
Technical Articles ID:
KB53035
Last Modified: 2023-03-21 10:47:47 Etc/GMT
Last Modified: 2023-03-21 10:47:47 Etc/GMT
Environment
ePolicy Orchestrator (ePO) 5.x
Trellix Agent (TA) 5.x
Trellix Agent (TA) 5.x
Summary
This article describes the path that events take from a managed product (client) to the ePO database. You can use these steps to troubleshoot event issues for incorrect and unexpected event query results.
The following describes the path from creation of an event by the managed product to the database:
Managed product --> AgentEvents folder or MA database --> Agent-to-server communication interval --> ePO Server Service --> ePO Events folder --> ePO Events Parser Service --> Database or syslog server
Generated Managed product events by Endpoint Security (ENS) are passed to TA. Some products that use a legacy plug-in write events to theAgentEvents folder. Newer products, such as Active Response and Data Loss Prevention 11.4 and later, use msgbus instead of the legacy LPC plug-in. When these newer msgbus products generate an event, the event is stored in the Agent database instead of the AgentEvents folder. The events are then uploaded to the Agent Handler (Apache service), either immediately or at the next agent-to-server communication interval (ASCI). The Agent Handler saves them to the Events folder on the server. The EventParser Service processes the events, writing them to the database. If configured, the EventParser service forwards the event to a Syslog Server after the Apache service receives the event.
For more information about how to configure a Registered syslog server, see the ePO 5.10 Product Guide for instructions.
The following describes the path from creation of an event by the managed product to the database:
Generated Managed product events by Endpoint Security (ENS) are passed to TA. Some products that use a legacy plug-in write events to the
For more information about how to configure a Registered syslog server, see the ePO 5.10 Product Guide for instructions.
Solution
The following contains specific information about the path an event takes. Becoming familiar with the specific details helps you understand where a potential problem might be occurring.
Event Filtering
Events are generated through the managed products, such as ENS or TA. The configuration within the Event Filtering settings determines the following:
- Whether the event is generated on the endpoint
- If the event is also forwarded to a registered
Syslog Server
- Log on to the ePO console.
- Click Menu, Configuration, Server Settings.
- Click Event Filtering under the Setting Categories column, and click Edit.
- Select or deselect the Event IDs, as needed. Or, choose to store them only in ePO, in SIEM, or both, and then click Save.
After a change has been made to the list of enabled or disabled events, this change is saved on the ePO Server. The clients then download it using a file named
The
- For Windows:
C:\ProgramData\McAfee\Agent\ - For Linux and macOS:
/var/McAfee/agent/scratch
Events are generated using one of the following methods:
- A managed product, such as ENS, calls a TA
dll (ma_event_service.dll ). - Products that use the older legacy LPC plug-in store events in the
AgentEvents folder.
- If the event is low priority, it's held in the
AgentEvents folder, and is uploaded to the ePO server at the next ASCI. - If the event is high priority, it's uploaded immediately (priority event forwarding configured under TA General policy, Events tab).
NOTE: TheAgentEvents folder is located under the agent directory structure, which differs depending on operating system:
- For Windows:
C:\ProgramData\McAfee\Agent\AgentEvents - For Linux, macOS:
/var/McAfee/agent/AgentEvents
- For Windows:
Verify that the event is being generated on the endpoint in either of the following:
AgentEvents folder- TA database, if the product generating the event is a newer
msgbus product
- To make it easier to capture the event on the endpoint, temporarily prevent the agent from uploading the events to the ePO server. Prevent the upload by doing one of the following:
NOTE: Usually, there's plenty of time to capture a copy of the event on the endpoint without doing one of these things.
- Stop the TA service on the client.
- Stop the ePO Server service on the ePO server and Agent Handler (Apache service).
- Disable the network adapter on the client system.
NOTE: VSE/ENS Access Protection or TA Self-Protect might prevent you from stopping TA services.
- Reproduce the action and generate the specific event or a generic detection event on the system. See the following:
- How to use the
EICAR antimalware test file with our products. For details, see KB59742 - How to use the EICAR test file with our products. - For SPAM products, use a similar test file called
GTUBE . Email it from an external email address to your company address so it goes through the SPAM scanner.
Download theGTUBE test file from the GTUBE landing page. - Look in the
AgentEvents folder for randomly named files that are waiting to be uploaded to the ePO server. - For products such as MAR, EDR, DXL, or DLP 11.4 or later, which use
msgbus , you need to collect MER results from the client. Or, collect the TA\db and\keystore files, and use the MER Analyzer to view the event. - Open the event to review the properties of the event. Most events are typical xml files. You can open these files and view the details of the event using a browser or text editor such as
Notepad++ .
- How to use the
- Re-enable the connection to the ePO server using one of the following methods (depending on the action taken in step 1):
- Start the TA service on the client.
- Start the Agent Handler service.
- Enable the network adapter on the client.
- Normal priority events are uploaded during the normal ASCI. You can upload these immediately using the Send Events button on the McAfee Agent Status Monitor.
Troubleshoot for Server (Agent Handler on ePO server, or other server)
Receiving the event:
After TA has uploaded the event, the Apache service receives it. It's then handled on either the ePO server or on a Remote Agent Handler. The handler then stores the event in the Events folder, and we see logging similar to the following in the
I #10244 NAIMSERV Processed [Event] from <name of client system>:{75BCADA0-16B4-11EA-27C6-005056014A0F} in 0ms
Events folder location:
Parsing or Forwarding the event:
The
If configured, the event might be forwarded to the syslog receiver. In this case, if LogLevel 8 is enabled on the ePO server or remote Agent Handler, you see activity similar to the following in the eventparser_ .log file :
#07008 EVNTPRSR source\SyslogForwarder.cpp(371): Found cached work item data for tenant 1: bpsid=1, guid={00000000-0000-0000-0000-000000000000}, nodepath=1\2
#07008 EVNTPRSR source\SyslogForwarder.cpp(376): Construct new work item for tenant 1: bpsid=1, guid={00000000-0000-0000-0000-000000000000}, nodepath=1\2
#07008 MFEFIPS mfefips_SSLSubSys.cpp(230): Using cached connection for :6514
For a related article, see KB56207 - Data Collection - How to enable Log Level 8 for ePolicy Orchestrator troubleshooting.
For threat type events (Malware detected, Access Protection rule triggered), you see the event show up in theThreat Event Log . It appears under the Reporting menu in the ePO console. Any event that has been successfully parsed can be queried using an Events query under Queries and Reports.
Troubleshoot event flow:
Additional information about events that aren't parsed by #07008 EVNTPRSR source\SyslogForwarder.cpp(376): Construct new work item for tenant 1: bpsid=1, guid={00000000-0000-0000-0000-000000000000}, nodepath=1\2
#07008 MFEFIPS mfefips_SSLSubSys.cpp(230): Using cached connection for :6514
For a related article, see KB56207 - Data Collection - How to enable Log Level 8 for ePolicy Orchestrator troubleshooting.
For threat type events (Malware detected, Access Protection rule triggered), you see the event show up in the
Troubleshoot event flow:
- The event isn't generated on the endpoint:
- Verify that the event isn't listed as one of the disabled events in the
EvtFiltr.ini file. - Attempt to reproduce the action that can generate the event, and look in the
masvc_ .log file for errors. - Verify the managed product that generates the event is running.
- Verify that the event isn't listed as one of the disabled events in the
- The event isn't sent to the ePO Server or Agent Handler:
- Look in the
masvc_ .log file for errors just after an attempt to communicate to the handler or send the event. - Verify that the
Apache service is running on the ePO server or Agent Handler.
- Look in the
- The event isn't visible in ePO after verifying that it's successfully uploaded from the endpoint:
- Verify if the client is communicating to the ePO server or a remote Agent Handler.
- Look in the
eventparser_ .log file for errors that might have occurred just after the client forwards the event. - If there are errors in the
eventparser log file, try to obtain a copy of the event. Check if it can be successfully parsed on a lab ePO server. - Verify that the latest extension is installed for the managed product that generates the event.
- Check if there's a separate reporting extension for the managed product. Install the extension, if applicable.
- The
Syslog Server doesn't receive the event:- Verify if the client is communicating to the ePO Server or a remote Agent Handler.
- Look in the
eventparser_ .log file for errors that might have occurred just after the event is forwarded from the client. - In the ePO console, edit the Registered
Syslog Server, and verify that the Test connection option under the Details tab is successful.
Event plug-ins:
Events that are generated for VSE, HIPs, or DLP are parsed with an event parser plug-in. The plug-in is installed when you install the extension for that managed product. These plug-ins are responsible for writing the event to the database and are installed within the ePO or Agent Handler installation folder under the
NOTE: Some managed products contain a separate reporting extension that contains this plug-in. For example, VSE has a management extension and a reporting extension. The event parsing plug-in is added only through the reporting extension.
When the
Unknown Events:
ePO doesn't know how to parse the event if ePO receives a
- No event parser plug-in is available for this event under the
\DB\Plugin folder
Or - It exists within the
EPORegisteredEventPlugins table
In the above situation, it's considered as an Unknown event. When this event occurs, you see log activity similar to the following in the
By default, all unknown events are deleted. But, it's possible to configure ePO, or a remote handler, so that it stores these events in a temporary folder.
To keep Unknown Events, follow these steps on the ePO server and any remote Agent Handlers:
CAUTION: This article contains information about opening or modifying the registry.
- The following information is intended for System Administrators. Registry modifications are irreversible and could cause system failure if done incorrectly.
- Before proceeding, Technical Support strongly recommends that you back up your registry and understand the restore process. For more information, see the Microsoft Windows registry information for advanced users article.
- Do not run a REG file that is not confirmed to be a genuine registry import file.
- To open the Windows registry, press Windows+R, type
regedit.exe , and click OK. - Navigate to the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Network Associates\ePolicy Orchestrator\EventParser\
- Add the [DWORD]
DeleteUnknownEvents , if it isn't already present. - Set the value to 0. Default value is 1.
- Close the registry editor.
- Restart the
EventParser service.
Failed Events:
Anytime the
NOTE: The above doesn't include events that the
These events remain in the
Previous Document ID (Secured)
615924
Affected Products
Languages:
This article is available in the following languages: