Device Control Detections Report

The Device Control Detections report lists the most recent Device Control violations detected by CPM.

Access this report by navigating to Endpoint Protection > Core Protection Module > Reports > Threat Detection and clicking the Device Control Detections tab.

This report provides the following information.

  • Date/Time: The date and time that the violation occurred.

  • Computer: The computer from which the violation originated.

  • Accessed By: The name of the user logged onto the computer from which the violation originated.

  • Target: The location on the device that the user tried to access.

  • Device: The device that the user tried to access.

  • Permission: The permission level granted to the device.