Information is required about the various Application and Device Control reports and logs.
About the information in the Application Control and Device Control reports and logs
|Report or log||Typical uses|
|Top Groups with most Alerted Application Control Logs||Use this report to check which groups are most at risk in your network.|
|Top Targets Blocked||Use this report to check which files, processes, and other entities are used most frequently in attacks against your network.|
|Top Devices Blocked||Use this report to find out which devices are the most problematic from the standpoint of compromising your network's security.|
|Application Control log||Use this log to see information about the following entities:
|Device Control log||Use this log when you need to see Device Control details, such as the exact time that Device Control enabled or disabled devices. This log also displays information such as the name of the computer, its location, the user who was logged on, and the operating system involved.|