You can view this information by clicking one of the following links on the
Policy Violations tab on the Security Risk
Detections Over Time widget:
-
The Device Control detection count in the table view
-
Any Device Control node in the graph view
Click Export to save the log events in a CSV
file.
|
Column
|
Description
|
|
Date/Time
|
Date and time that the Security Agent reported the Device Control violation
information to Worry-Free Business
Security
|
|
Device Name
|
Name of the device that triggered a policy violation
|
|
Type
|
Type of storage device
|
|
Permission
|
Permission set for the storage device
|
|
Subject
|
Subject of the operation
|
|
Object
|
Object of the operation
|
|
Operation
|
Operation done
|
