- 
                           
Date/Time unauthorized process was detected
                         
                        - 
                           
Computer where unauthorized process was detected
                         
                        - 
                           
Computer’s domain
                         
                        - 
                           
Violation, which is the event monitoring rule violated
                              by the process
                           
                         
                        - 
                           
Action performed when violation was detected
                         
                        - 
                           
Event, which is the type of object accessed by the program
                         
                        - 
                           
Risk level of the unauthorized program
                         
                        - 
                           
Program, which is the unauthorized program 
                         
                        - 
                           
Operation, which is the action performed by the unauthorized
                              program
                           
                         
                        - 
                           
Target, which is the process that was accessed