Viewing Device Control Logs Parent topic

Procedure

  1. Navigate to LogsNetworked Computer LogsSecurity Risks or Networked ComputersClient Management.
  2. In the client tree, click the root domain icon (icon_root-7.bmp) to include all clients or select specific domains or clients.
  3. Click LogsDevice Control Logs or View LogsDevice Control Logs.
  4. Specify the log criteria and then click Display Logs.
  5. View logs. Logs contain the following information:
    • Date/Time unauthorized access was detected
    • Computer where external device is connected or where network resource is mapped
    • Computer domain where external device is connected or where network resource is mapped
    • Device type or network resource accessed
    • Target, which is the item on the device or network resource that was accessed
    • Accessed by, which specifies where access was initiated
    • Permissions set for the target
  6. To save logs to a comma-separated value (CSV) file, click Export to CSV. Open the file or save it to a specific location.