Security Risk Detections: Device Control

You can view this information by clicking one of the following links on the Policy Violations tab on the Security Risk Detections Over Time widget:

  • The Device Control detection count in the table view

  • Any Device Control node in the graph view

Click Export to save the log events in a CSV file.

Table 1.

Column

Description

Date/Time

Date and time that the Security Agent reported the Device Control violation information to Worry-Free Business Security

Device Name

Name of the device that triggered a policy violation

Type

Type of storage device

Permission

Permission set for the storage device

Subject

Subject of the operation

Object

Object of the operation

Operation

Operation done