Connected devices grouped by category |
This report shows a list of external devices that were plugged in to machines monitored by GFI EndPointSecurity Agents. All devices are grouped under their category. |
User based technical report |
This report lists all device access requested by users. Activity is grouped by user name and event type and also lists the application that attempted the access, and for file system devices, also the path and filename. |
Machine based technical report
|
This report shows a list of device access requests made from each machine. Each activity is grouped by machine name and event type and includes the application that attempted the accessed. In case of file system devices, the accessed path and filename are also provided. |
Device based technical report |
This report shows a list of events originating from devices monitored by GFI EndPointSecurity. Events are sorted in chronological order and grouped by device description. |
Detailed device activity listing |
This report lists all details of all Agent Activity across monitored Computers. |
Encryption activity report |
Use this report in order to determine the status of encryption across the network. |