-
Date/Time unauthorized process was detected
-
Computer where unauthorized process was detected
-
Computer’s domain
-
Violation, which is the event monitoring rule violated
by the process
-
Action performed when violation was detected
-
Event, which is the type of object accessed by the program
-
Risk level of the unauthorized program
-
Program, which is the unauthorized program
-
Operation, which is the action performed by the unauthorized
program
-
Target, which is the process that was accessed