Views:
You can view this information by clicking one of the following links on the Policy Violations tab on the Security Risk Detections Over Time widget:
  • The Device Control detection count in the table view
  • Any Device Control node in the graph view
Click Export to save the log events in a CSV file.

Column
Description
Date/Time
Date and time that the Security Agent reported the Device Control violation information to Worry-Free Business Security
Device Name
Name of the device that triggered a policy violation
Type
Type of storage device
Permission
Permission set for the storage device
Subject
Subject of the operation
Object
Object of the operation
Operation
Operation done