This section provides information on how to use Endpoint Sensor to monitor endpoints for suspicious files.
Topics include:
Monitoring
Submitted for Analysis
Monitoring Log
Purging Monitoring Tables