You can view this information by clicking one of the following links on the Policy Violations tab on the Security Risk Detections Over Time widget:
-
The Device Control detection count in the table view
-
Any Device Control node in the graph view
Click Export to save the log events in a CSV file.
Column |
Description |
---|---|
Date/Time |
Date and time that the Security Agent reported the Device Control violation information to Worry-Free Business Security |
Device Name |
Name of the device that triggered a policy violation |
Type |
Type of storage device |
Permission |
Permission set for the storage device |
Subject |
Subject of the operation |
Object |
Object of the operation |
Operation |
Operation done |