Contents
Index
Search
Search Knowledge Base
Collapse All
Expand All
Previous
Next
Search
Toggle Highlight
Using Behavior Monitoring
This chapter describes how to protect computers from security risks using the Behavior Monitoring feature.
Topics in this chapter:
Behavior Monitoring
Behavior Monitoring Privileges
Behavior Monitoring Notifications for OfficeScan Client Users
Behavior Monitoring Logs