Security Risk Detections: Behavior Monitoring

You can view this information by clicking one of the following links on the Unknown Threats tab on the Security Risk Detections Over Time widget:

  • The Behavior Monitoring detection count in the table view

  • Any Behavior Monitoring node in the graph view

Click Export to save the log events in a CSV file.

Table 1.

Column

Description

Date/Time

Date and time that the Security Agent reported the Behavior Monitoring violation information to Worry-Free Business Security

Device Name

Name of the device that triggered a policy violation

Security Threat

Type of security threat

Subject

Subject of the operation

Event Type

Related system event

Target

Target of the operation

Operation

Operation performed by the user that triggered the violation

Result

Action taken by Worry-Free Business Security in response to the Behavior Monitoring violation