Provides specific information about application violations on your network. For example: the violated policy and rule name, the specific information about the endpoint and application
Data |
Description |
---|---|
Received |
Displays the time that Control Manager receives data from the managed product. |
Generated |
Displays the time that the managed product generates data. |
User Name |
Displays the name of the user account. |
Endpoint |
Displays the host name of the affected computer. |
Action |
Displays the action type: Allow, Block, Lockdown. |
Application |
Displays the name of the application that triggers the rule. |
Version |
Displays the version information. |
Policy |
Displays the name of the Trend Micro™ Endpoint Application Control™ policy. |
Rule |
Displays the name of the rule for application usage. |
Server |
Displays the host name of the Endpoint Application Control server. |
Connection Status |
Displays the status of the specific Endpoint Application Control server connected to. |
Endpoint IP Address |
Displays the IP address of the computer in compliance of the policy/rule. |
SHA-1 |
Displays the file signature. |
Command |
Displays the type of command issued. |
Process Owner |
Displays the user name of the account that issued the command. |