Security Risk Detections: URL Filtering

You can view this information by clicking one of the following links on the Policy Violations tab on the Security Risk Detections Over Time widget:

  • The URL Filtering detection count in the table view

  • Any URL Filtering node in the graph view

Click Export to save the log events in a CSV file.

Table 1.




Date and time that the Security Agent reported the URL violation information to Worry-Free Business Security

Device Name

Name of the device attempting to access a restricted URL


Restricted URL